Bugzilla – Bug 1212125
VUL-0: CVE-2023-3153: openvswitch,openvswitch3: service monitor MAC flow is not rate limited
Last modified: 2024-02-16 08:10:16 UTC
The service monitor MAC is exposed through the following flow: ovn_lflow_add(lflows, od, S_SWITCH_IN_L2_LKUP, 110, "eth.dst == $svc_monitor_mac", "handle_svc_check(inport);"); This doesn't handle rate limit via CoPP. There is potential to DoS ovn-controller even on deployments with CoPP enabled and configured as all packets with this destination mac within the switch are sent directly to pinctrl thread in ovn-controller. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3153 https://bugzilla.redhat.com/show_bug.cgi?id=2213279
Affected packages: - SUSE:SLE-15-SP2:Update/openvswitch - SUSE:SLE-15-SP3:Update/openvswitch - SUSE:SLE-15-SP4:Update/openvswitch - SUSE:SLE-15-SP5:Update/openvswitch3 - openSUSE:Factory/openvswitch
Hi Stoyan, we have the patches with the fix and I will create a SR/MR as soon as possible for this CVE.
This is an autogenerated message for OBS integration: This bug (1212125) was mentioned in https://build.opensuse.org/request/show/1109539 Factory / openvswitch
SUSE-SU-2023:3710-1: An update that solves two vulnerabilities can now be installed. Category: security (moderate) Bug References: 1212125 CVE References: CVE-2023-3152, CVE-2023-3153 Sources used: openSUSE Leap 15.5 (src): openvswitch3-3.1.0-150500.3.6.2 Server Applications Module 15-SP5 (src): openvswitch3-3.1.0-150500.3.6.2 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.