A flaw was found in Open vSwitch that allows ICMPv6 Neighbor Advertisement packets between virtual machines to bypass OpenFlow rules. This issue may allow a local attacker to create specially crafted packets with a modified or spoofed target IP address field that can redirect ICMPv6 traffic to arbitrary IP addresses.

Project Subscriptions

Vendors Products
Openvswitch Subscribe
Openvswitch Subscribe
Enterprise Linux Subscribe
Fast Datapath Subscribe
Openshift Subscribe
Openshift Container Platform Subscribe
Openstack Subscribe
Virtualization Subscribe
Advisories
Source ID Title
Debian DLA Debian DLA DLA-3734-1 openvswitch security update
Debian DSA Debian DSA DSA-5640-1 openvswitch security update
EUVD EUVD EUVD-2023-57682 A flaw was found in Open vSwitch that allows ICMPv6 Neighbor Advertisement packets between virtual machines to bypass OpenFlow rules. This issue may allow a local attacker to create specially crafted packets with a modified or spoofed target IP address field that can redirect ICMPv6 traffic to arbitrary IP addresses.
Ubuntu USN Ubuntu USN USN-6514-1 Open vSwitch vulnerability
Ubuntu USN Ubuntu USN USN-6690-1 Open vSwitch vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2025-02-13T17:20:09.786Z

Reserved: 2023-10-03T19:14:58.793Z

Link: CVE-2023-5366

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-10-06T18:15:12.520

Modified: 2024-11-21T08:41:37.093

Link: CVE-2023-5366

cve-icon Redhat

Severity : Moderate

Publid Date: 2023-09-26T00:00:00Z

Links: CVE-2023-5366 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses