A flaw was found in Open vSwitch that allows ICMPv6 Neighbor Advertisement packets between virtual machines to bypass OpenFlow rules. This issue may allow a local attacker to create specially crafted packets with a modified or spoofed target IP address field that can redirect ICMPv6 traffic to arbitrary IP addresses.
The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Openvswitch | Openvswitch | * | 2023-02-28 (excluding) |
Openvswitch | Ubuntu | bionic | * |
Openvswitch | Ubuntu | devel | * |
Openvswitch | Ubuntu | esm-infra/bionic | * |
Openvswitch | Ubuntu | esm-infra/xenial | * |
Openvswitch | Ubuntu | focal | * |
Openvswitch | Ubuntu | jammy | * |
Openvswitch | Ubuntu | lunar | * |
Openvswitch | Ubuntu | mantic | * |
Openvswitch | Ubuntu | noble | * |
Openvswitch | Ubuntu | oracular | * |
Openvswitch | Ubuntu | trusty | * |
Openvswitch | Ubuntu | upstream | * |
Openvswitch | Ubuntu | xenial | * |
Fast Datapath for Red Hat Enterprise Linux 8 | RedHat | openvswitch2.17-0:2.17.0-148.el8fdp | * |
Fast Datapath for Red Hat Enterprise Linux 8 | RedHat | openvswitch3.1-0:3.1.0-96.el8fdp | * |
Fast Datapath for Red Hat Enterprise Linux 9 | RedHat | openvswitch2.17-0:2.17.0-131.el9fdp | * |
Fast Datapath for Red Hat Enterprise Linux 9 | RedHat | openvswitch3.2-0:3.2.0-56.el9fdp | * |
Fast Datapath for Red Hat Enterprise Linux 9 | RedHat | openvswitch3.1-0:3.1.0-88.el9fdp | * |