CVE Vulnerabilities

CVE-2023-5366

Insufficient Verification of Data Authenticity

Published: Oct 06, 2023 | Modified: Mar 23, 2024
CVSS 3.x
5.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
5.5 MODERATE
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Ubuntu
MEDIUM

A flaw was found in Open vSwitch that allows ICMPv6 Neighbor Advertisement packets between virtual machines to bypass OpenFlow rules. This issue may allow a local attacker to create specially crafted packets with a modified or spoofed target IP address field that can redirect ICMPv6 traffic to arbitrary IP addresses.

Weakness

The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.

Affected Software

Name Vendor Start Version End Version
Openvswitch Openvswitch * 2023-02-28 (excluding)
Openvswitch Ubuntu bionic *
Openvswitch Ubuntu devel *
Openvswitch Ubuntu esm-infra/bionic *
Openvswitch Ubuntu esm-infra/xenial *
Openvswitch Ubuntu focal *
Openvswitch Ubuntu jammy *
Openvswitch Ubuntu lunar *
Openvswitch Ubuntu mantic *
Openvswitch Ubuntu noble *
Openvswitch Ubuntu oracular *
Openvswitch Ubuntu trusty *
Openvswitch Ubuntu upstream *
Openvswitch Ubuntu xenial *
Fast Datapath for Red Hat Enterprise Linux 8 RedHat openvswitch2.17-0:2.17.0-148.el8fdp *
Fast Datapath for Red Hat Enterprise Linux 8 RedHat openvswitch3.1-0:3.1.0-96.el8fdp *
Fast Datapath for Red Hat Enterprise Linux 9 RedHat openvswitch2.17-0:2.17.0-131.el9fdp *
Fast Datapath for Red Hat Enterprise Linux 9 RedHat openvswitch3.2-0:3.2.0-56.el9fdp *
Fast Datapath for Red Hat Enterprise Linux 9 RedHat openvswitch3.1-0:3.1.0-88.el9fdp *

References