Skip to content

A flaw was found in Open vSwitch that allows ICMPv6...

Moderate severity Unreviewed Published Oct 6, 2023 to the GitHub Advisory Database • Updated Mar 23, 2024

Package

No package listedSuggest a package

Affected versions

Unknown

Patched versions

Unknown

Description

A flaw was found in Open vSwitch that allows ICMPv6 Neighbor Advertisement packets between virtual machines to bypass OpenFlow rules. This issue may allow a local attacker to create specially crafted packets with a modified or spoofed target IP address field that can redirect ICMPv6 traffic to arbitrary IP addresses.

References

Published by the National Vulnerability Database Oct 6, 2023
Published to the GitHub Advisory Database Oct 6, 2023
Last updated Mar 23, 2024

Severity

Moderate

EPSS score

0.042%
(5th percentile)

Weaknesses

CVE ID

CVE-2023-5366

GHSA ID

GHSA-f89w-2cg8-8h78

Source code

No known source code

Dependabot alerts are not supported on this advisory because it does not have a package from a supported ecosystem with an affected and fixed version.

Learn more about GitHub language support

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.