An update for openvswitch is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3,openEuler-22.03-LTS and openEuler-22.03-LTS-SP1
Security Advisory
openeuler-security@openeuler.org
openEuler security committee
openEuler-SA-2023-1234
Final
1.0
1.0
2023-04-21
Initial
2023-04-21
2023-04-21
openEuler SA Tool V1.0
2023-04-21
openvswitch security update
An update for openvswitch is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3,openEuler-22.03-LTS and openEuler-22.03-LTS-SP1.
Open vSwitch provides standard network bridging functions and support for the OpenFlow protocol for remote per-flow control of traffic.
Security Fix(es):
A flaw was found in openvswitch (OVS). When processing an IP packet with protocol 0, OVS will install the datapath flow without the action modifying the IP header. This issue results (for both kernel and userspace datapath) in installing a datapath flow matching all IP protocols (nw_proto is wildcarded) for this flow, but with an incorrect action, possibly causing incorrect handling of other IP packets with a != 0 IP protocol that matches this dp flow.(CVE-2023-1668)
An update for openvswitch is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3,openEuler-22.03-LTS and openEuler-22.03-LTS-SP1.
openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
High
openvswitch
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1234
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2023-1668
https://nvd.nist.gov/vuln/detail/CVE-2023-1668
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP3
openEuler-22.03-LTS
openEuler-22.03-LTS-SP1
python3-openvswitch-2.12.4-4.oe1.aarch64.rpm
openvswitch-devel-2.12.4-4.oe1.aarch64.rpm
openvswitch-debuginfo-2.12.4-4.oe1.aarch64.rpm
openvswitch-2.12.4-4.oe1.aarch64.rpm
openvswitch-help-2.12.4-4.oe1.aarch64.rpm
openvswitch-debugsource-2.12.4-4.oe1.aarch64.rpm
openvswitch-devel-2.12.4-5.oe1.aarch64.rpm
openvswitch-debugsource-2.12.4-5.oe1.aarch64.rpm
openvswitch-help-2.12.4-5.oe1.aarch64.rpm
openvswitch-2.12.4-5.oe1.aarch64.rpm
openvswitch-debuginfo-2.12.4-5.oe1.aarch64.rpm
python3-openvswitch-2.12.4-5.oe1.aarch64.rpm
openvswitch-help-2.12.4-4.oe2203.aarch64.rpm
openvswitch-debugsource-2.12.4-4.oe2203.aarch64.rpm
openvswitch-devel-2.12.4-4.oe2203.aarch64.rpm
openvswitch-debuginfo-2.12.4-4.oe2203.aarch64.rpm
openvswitch-2.12.4-4.oe2203.aarch64.rpm
openvswitch-debuginfo-2.12.4-3.oe2203sp1.aarch64.rpm
openvswitch-help-2.12.4-3.oe2203sp1.aarch64.rpm
openvswitch-devel-2.12.4-3.oe2203sp1.aarch64.rpm
openvswitch-debugsource-2.12.4-3.oe2203sp1.aarch64.rpm
openvswitch-2.12.4-3.oe2203sp1.aarch64.rpm
openvswitch-2.12.4-4.oe1.src.rpm
openvswitch-2.12.4-5.oe1.src.rpm
openvswitch-2.12.4-4.oe2203.src.rpm
openvswitch-2.12.4-3.oe2203sp1.src.rpm
openvswitch-2.12.4-4.oe1.x86_64.rpm
openvswitch-debugsource-2.12.4-4.oe1.x86_64.rpm
openvswitch-help-2.12.4-4.oe1.x86_64.rpm
openvswitch-devel-2.12.4-4.oe1.x86_64.rpm
openvswitch-debuginfo-2.12.4-4.oe1.x86_64.rpm
python3-openvswitch-2.12.4-4.oe1.x86_64.rpm
openvswitch-debuginfo-2.12.4-5.oe1.x86_64.rpm
openvswitch-devel-2.12.4-5.oe1.x86_64.rpm
python3-openvswitch-2.12.4-5.oe1.x86_64.rpm
openvswitch-2.12.4-5.oe1.x86_64.rpm
openvswitch-debugsource-2.12.4-5.oe1.x86_64.rpm
openvswitch-help-2.12.4-5.oe1.x86_64.rpm
openvswitch-debugsource-2.12.4-4.oe2203.x86_64.rpm
openvswitch-debuginfo-2.12.4-4.oe2203.x86_64.rpm
openvswitch-help-2.12.4-4.oe2203.x86_64.rpm
openvswitch-devel-2.12.4-4.oe2203.x86_64.rpm
openvswitch-2.12.4-4.oe2203.x86_64.rpm
openvswitch-help-2.12.4-3.oe2203sp1.x86_64.rpm
openvswitch-debuginfo-2.12.4-3.oe2203sp1.x86_64.rpm
openvswitch-debugsource-2.12.4-3.oe2203sp1.x86_64.rpm
openvswitch-devel-2.12.4-3.oe2203sp1.x86_64.rpm
openvswitch-2.12.4-3.oe2203sp1.x86_64.rpm
A flaw was found in openvswitch (OVS). When processing an IP packet with protocol 0, OVS will install the datapath flow without the action modifying the IP header. This issue results (for both kernel and userspace datapath) in installing a datapath flow matching all IP protocols (nw_proto is wildcarded) for this flow, but with an incorrect action, possibly causing incorrect handling of other IP packets with a != 0 IP protocol that matches this dp flow.
2023-04-21
CVE-2023-1668
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP3
openEuler-22.03-LTS
openEuler-22.03-LTS-SP1
High
7.1
AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
openvswitch security update
2023-04-21
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1234