First published: Wed Jun 07 2023(Updated: )
A flaw was found in Open Virtual Network where the service monitor MAC does not properly rate limit. This issue could allow an attacker to cause a denial of service, including on deployments with CoPP enabled and properly configured.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ovn Open Virtual Network | <22.03.3 | |
Ovn Open Virtual Network | >=22.03.4<22.09.2 | |
Ovn Open Virtual Network | >=22.09.3<22.12.1 | |
Ovn Open Virtual Network | >=22.12.2<23.03.1 | |
Ovn Open Virtual Network | >=23.03.2<23.06.1 | |
Redhat Openshift Container Platform | =4.0 | |
Redhat Fast Datapath | ||
Redhat Enterprise Linux | =9.0 | |
redhat/ovn | <22.03.3 | 22.03.3 |
redhat/ovn | <22.09.2 | 22.09.2 |
redhat/ovn | <22.12.1 | 22.12.1 |
redhat/ovn | <23.03.1 | 23.03.1 |
redhat/ovn | <23.06.1 | 23.06.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-3153 is a vulnerability found in Open Virtual Network that allows an attacker to cause a denial of service.
CVE-2023-3153 has a severity rating of medium (5.3).
The affected software versions are OVN Open Virtual Network 22.03.3 to 23.06.1.
To fix CVE-2023-3153, update the affected software to version 22.09.2, 22.12.1, 23.03.1, or 23.06.1.
More information about CVE-2023-3153 can be found at the following references: [Reference 1](https://access.redhat.com/security/cve/CVE-2023-3153), [Reference 2](https://bugzilla.redhat.com/show_bug.cgi?id=2213279), [Reference 3](https://github.com/ovn-org/ovn/commit/9a3f7ed905e525ebdcb14541e775211cbb0203bd).