Bug 1212125 (CVE-2023-3153) - VUL-0: CVE-2023-3153: openvswitch,openvswitch3: service monitor MAC flow is not rate limited
Summary: VUL-0: CVE-2023-3153: openvswitch,openvswitch3: service monitor MAC flow is n...
Status: NEW
Alias: CVE-2023-3153
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Duraisankar P
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/368781/
Whiteboard: CVSSv3.1:SUSE:CVE-2023-3153:5.3:(AV:N...
Keywords:
Depends on:
Blocks:
 
Reported: 2023-06-08 06:49 UTC by Gianluca Gabrielli
Modified: 2024-02-16 08:10 UTC (History)
4 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Gianluca Gabrielli 2023-06-08 06:49:36 UTC
The service monitor MAC is exposed through the following flow:
ovn_lflow_add(lflows, od, S_SWITCH_IN_L2_LKUP, 110,
              "eth.dst == $svc_monitor_mac",
              "handle_svc_check(inport);");

This doesn't handle rate limit via CoPP. There is potential to
DoS ovn-controller even on deployments with CoPP enabled and configured
as all packets with this destination mac within the switch are sent directly to pinctrl thread in ovn-controller.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3153
https://bugzilla.redhat.com/show_bug.cgi?id=2213279
Comment 1 Gianluca Gabrielli 2023-06-08 06:50:17 UTC
Affected packages:
 - SUSE:SLE-15-SP2:Update/openvswitch
 - SUSE:SLE-15-SP3:Update/openvswitch
 - SUSE:SLE-15-SP4:Update/openvswitch
 - SUSE:SLE-15-SP5:Update/openvswitch3
 - openSUSE:Factory/openvswitch
Comment 5 Duraisankar P 2023-09-06 10:58:29 UTC
Hi Stoyan, 

we have the patches with the fix and I will create a SR/MR as soon as possible for this CVE.
Comment 9 OBSbugzilla Bot 2023-09-07 12:45:05 UTC
This is an autogenerated message for OBS integration:
This bug (1212125) was mentioned in
https://build.opensuse.org/request/show/1109539 Factory / openvswitch
Comment 10 Maintenance Automation 2023-09-20 20:30:12 UTC
SUSE-SU-2023:3710-1: An update that solves two vulnerabilities can now be installed.

Category: security (moderate)
Bug References: 1212125
CVE References: CVE-2023-3152, CVE-2023-3153
Sources used:
openSUSE Leap 15.5 (src): openvswitch3-3.1.0-150500.3.6.2
Server Applications Module 15-SP5 (src): openvswitch3-3.1.0-150500.3.6.2

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.