CVE-2023-5366
Summary
| CVE | CVE-2023-5366 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-10-06 18:15:00 UTC |
| Updated | 2024-03-16 02:15:00 UTC |
| Description | A flaw was found in Open vSwitch that allows ICMPv6 Neighbor Advertisement packets between virtual machines to bypass OpenFlow rules. This issue may allow a local attacker to create specially crafted packets with a modified or spoofed target IP address field that can redirect ICMPv6 traffic to arbitrary IP addresses. |
NVD Known Affected Configurations (CPE 2.3)
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 199950 Ubuntu Security Notification for Open vSwitch Vulnerability (USN-6514-1)
- 200184 Ubuntu Security Notification for Open vSwitch Vulnerabilities (USN-6690-1)
- 285360 Fedora Security Update for openvswitch (FEDORA-2024-a4530e9bfe)
- 510722 Alpine Linux Security Update for openvswitch
- 6000480 Debian Security Update for openvswitch (DLA 3734-1)
- 6000522 Debian Security Update for openvswitch (DSA 5640-1)
- 755301 SUSE Enterprise Linux Security Update for openvswitch (SUSE-SU-2023:4508-1)
- 755348 SUSE Enterprise Linux Security Update for openvswitch (SUSE-SU-2023:4573-1)
- 755350 SUSE Enterprise Linux Security Update for openvswitch (SUSE-SU-2023:4571-1)
- 755379 SUSE Enterprise Linux Security Update for openvswitch (SUSE-SU-2023:4666-1)
- 755381 SUSE Enterprise Linux Security Update for openvswitch3 (SUSE-SU-2023:4657-1)
- 755386 SUSE Enterprise Linux Security Update for openvswitch (SUSE-SU-2023:4714-1)
- 755452 SUSE Enterprise Linux Security Update for openvswitch (SUSE-SU-2023:4661-1)