Description
A flaw was found in Open vSwitch that allows ICMPv6 Neighbor Advertisement packets between virtual machines to bypass OpenFlow rules. This issue may allow a local attacker to create specially crafted packets with a modified or spoofed target IP address field that can redirect ICMPv6 traffic to arbitrary IP addresses.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3734-1 | openvswitch security update |
Debian DSA |
DSA-5640-1 | openvswitch security update |
EUVD |
EUVD-2023-57682 | A flaw was found in Open vSwitch that allows ICMPv6 Neighbor Advertisement packets between virtual machines to bypass OpenFlow rules. This issue may allow a local attacker to create specially crafted packets with a modified or spoofed target IP address field that can redirect ICMPv6 traffic to arbitrary IP addresses. |
Ubuntu USN |
USN-6514-1 | Open vSwitch vulnerability |
Ubuntu USN |
USN-6690-1 | Open vSwitch vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-02-13T17:20:09.786Z
Reserved: 2023-10-03T19:14:58.793Z
Link: CVE-2023-5366
No data.
Status : Modified
Published: 2023-10-06T18:15:12.520
Modified: 2024-11-21T08:41:37.093
Link: CVE-2023-5366
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
EUVD
Ubuntu USN