NA

CVE-2023-1668

Published: 10/04/2023 Updated: 26/11/2023
CVSS v3 Base Score: 8.2 | Impact Score: 4.2 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

A flaw was found in openvswitch (OVS). When processing an IP packet with protocol 0, OVS will install the datapath flow without the action modifying the IP header. This issue results (for both kernel and userspace datapath) in installing a datapath flow matching all IP protocols (nw_proto is wildcarded) for this flow, but with an incorrect action, possibly causing incorrect handling of other IP packets with a != 0 IP protocol that matches this dp flow.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

cloudbase open vswitch 3.1.0

cloudbase open vswitch

debian debian linux 11.0

redhat virtualization 4.0

redhat openshift container platform 4.0

redhat openstack platform 16.1

redhat openstack platform 16.2

redhat openstack platform 17.0

redhat fast_datapath -

Vendor Advisories

Debian Bug report logs - #1034042 openvswitch: CVE-2023-1668: Remote traffic denial of service via crafted packets with IP proto 0 Package: src:openvswitch; Maintainer for src:openvswitch is Debian OpenStack <team+openstack@trackerdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Fri, 7 Apr 20 ...
David Marchard discovered that Open vSwitch, a software-based Ethernet virtual switch, is suspectible to denial of service via malformed IP packets For the stable distribution (bullseye), this problem has been fixed in version 2150+ds1-2+deb11u4 We recommend that you upgrade your openvswitch packages For the detailed security status of openvsw ...
Synopsis Moderate: openvswitch31 security update Type/Severity Security Advisory: Moderate Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update for openvswitch31 is now available in Fast Datapath for Red HatEnterprise Linux 9Red Hat Product Security has ra ...
Synopsis Important: Red Hat Virtualization Host 44z SP 1 security update Type/Severity Security Advisory: Important Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update for redhat-release-virtualization-host and redhat-virtualization-host is now available f ...
Synopsis Moderate: openvswitch217 security update Type/Severity Security Advisory: Moderate Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update for openvswitch217 is now available in Fast Datapath for Red Hat Enterprise Linux 8Red Hat Product Security has ...
Synopsis Moderate: openvswitch213 security update Type/Severity Security Advisory: Moderate Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update for openvswitch213 is now available for Fast Datapath for Red Hat Enterprise Linux 8Red Hat Product Security ha ...
Synopsis Moderate: openvswitch31 security update Type/Severity Security Advisory: Moderate Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update for openvswitch31 is now available in Fast Datapath for Red Hat Enterprise Linux 8Red Hat Product Security has r ...
Synopsis Moderate: openvswitch215 security update Type/Severity Security Advisory: Moderate Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update for openvswitch215 is now available for Fast Datapath for Red Hat Enterprise Linux 8Red Hat Product Security ha ...
Description<!---->A flaw was found in openvswitch (OVS) When processing an IP packet with protocol 0, OVS will install the datapath flow without the action modifying the IP header This issue results (for both kernel and userspace datapath) in installing a datapath flow matching all IP protocols (nw_proto is wildcarded) for this flow, but with an ...