[Bug 1910608] Re: openvswitch embedded code copy of lldpd is vulnerable to CVE-2015-8011
Steve Beattie
1910608 at bugs.launchpad.net
Fri Jan 15 19:43:37 UTC 2021
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
OpenStack, which is subscribed to openvswitch in Ubuntu.
https://bugs.launchpad.net/bugs/1910608
Title:
openvswitch embedded code copy of lldpd is vulnerable to CVE-2015-8011
Status in openvswitch package in Ubuntu:
New
Bug description:
This is a non-public announce for downstream stakeholders.
Public announce will take place on 13-Jan-2021 along with release
of new upstream stable versions listed below.
---
For release 13-Jan-2021
Description
===========
Multiple versions of Open vSwitch are vulnerable to remote buffer
overflow attacks in which crafted LLDP packets could overflow the
buffer reserved for management address information in an internal
OVS data structure. Triggering the vulnerability requires LLDP
processing to be enabled for a specific port. Open vSwitch
versions before 2.5.x are not vulnerable.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
previously assigned the identifier CVE-2015-8011 to this issue for
the `lldpd` project, and is appropriate here since Open vSwitch uses
the same `lldpd` code.
Mitigation
==========
For any version of Open vSwitch, preventing LLDP packets from
reaching Open vSwitch mitigates the vulnerability. We do not recommend
attempting to mitigate the vulnerability this way because of the
following difficulties:
- Open vSwitch obtains packets before the iptables host firewall,
so ebtables on the Open vSwitch host cannot ordinarily block the
vulnerability.
- If Open vSwitch is configured to receive and transmit LLDP
messages, the required functionality will need to be disabled
potentially disrupting the network.
We have found that Open vSwitch is subject to a remote code execution
exploit when LLDP processing is enabled on an interface. By default,
interfaces are not configured to process LLDP messages.
Fix
===
Patches to fix these vulnerabilities in Open vSwitch 2.5.x and newer are
applied to the various appropriate branches, and the original patch is
located at:
https://mail.openvswitch.org/pipermail/ovs-dev/2020-November/377394.html
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openvswitch/+bug/1910608/+subscriptions
More information about the Ubuntu-openstack-bugs
mailing list