Vulnerability CVE-2023-5366: Information

Description

A flaw was found in Open vSwitch that allows ICMPv6 Neighbor Advertisement packets between virtual machines to bypass OpenFlow rules. This issue may allow a local attacker to create specially crafted packets with a modified or spoofed target IP address field that can redirect ICMPv6 traffic to arbitrary IP addresses.

Severity: MEDIUM (5.5) Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

Published: Oct. 6, 2023
Modified: March 23, 2024
Error type identifier: CWE-345

Fixed packages

Package name
Branch
Fixed in version
Version from repository
Errata ID
Task #
State
openvswitchp102.17.9-alt12.17.9-alt1ALT-PU-2024-6293-2344872Fixed
openvswitchp10_e2k2.17.9-alt12.17.9-alt1ALT-PU-2024-6890-1-Fixed

References to Advisories, Solutions, and Tools

    1. Configuration 1

      cpe:2.3:a:openvswitch:openvswitch:*:*:*:*:*:*:*:*
      End excliding
      2023-02-28

      Configuration 2

      cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*

      cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*

      cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*

      Configuration 3

      cpe:2.3:a:redhat:fast_datapath:-:*:*:*:*:*:*:*

      Running on/with:
      cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*

      Running on/with:
      cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*

      Running on/with:
      cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*