The service monitor MAC is exposed through the following flow: ovn_lflow_add(lflows, od, S_SWITCH_IN_L2_LKUP, 110, "eth.dst == $svc_monitor_mac", "handle_svc_check(inport);"); This doesn't handle rate limit via CoPP. There is potential to DoS ovn-controller even on deployments with CoPP enabled and configured as all packets with this destination mac within the switch are sent directly to pinctrl thread in ovn-controller.
Created ovn tracking bugs for this issue: Affects: fedora-all [bug 2213285]
Is there any further public information on this issue? Is it reported upstream at https://github.com/ovn-org/ovn and/or does a upstream fix exists? I'm trying to get more information on CVE-2023-3153 for our tracking downstream in Debian about it.
In reply to comment #5: > Is there any further public information on this issue? Is it reported > upstream at https://github.com/ovn-org/ovn and/or does a upstream fix > exists? > > I'm trying to get more information on CVE-2023-3153 for our tracking > downstream in Debian about it. Hey there, there isn't much more information at this time. I'll update this bug with more information as it becomes available.
Hello team, Is this issue a valid one ? we could not see any bugs filed on https://github.com/ovn-org/ovn. Can you update more information on this issue ? IMO, if there isn't much information at this time, we can proceed to report it to OVN community and check whether it could be possible threat. Thanks Duraisankar
In reply to comment #7: > Hello team, > > Is this issue a valid one ? we could not see any bugs filed on > https://github.com/ovn-org/ovn. > > Can you update more information on this issue ? > > IMO, if there isn't much information at this time, we can proceed to report > it to OVN community and check whether it could be possible threat. > > Thanks > Duraisankar If they aren't already aware feel free to notify them.
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.14 Via RHSA-2023:5009 https://access.redhat.com/errata/RHSA-2023:5009
This issue has been addressed in the following products: Ironic content for Red Hat OpenShift Container Platform 4.11 Red Hat OpenShift Container Platform 4.11 Via RHSA-2023:6274 https://access.redhat.com/errata/RHSA-2023:6274