8.2
CVE-2023-1668
- EPSS 0.09%
- Veröffentlicht 10.04.2023 22:15:09
- Zuletzt bearbeitet 23.04.2025 17:16:28
- Quelle secalert@redhat.com
- Teams Watchlist Login
- Unerledigt Login
A flaw was found in openvswitch (OVS). When processing an IP packet with protocol 0, OVS will install the datapath flow without the action modifying the IP header. This issue results (for both kernel and userspace datapath) in installing a datapath flow matching all IP protocols (nw_proto is wildcarded) for this flow, but with an incorrect action, possibly causing incorrect handling of other IP packets with a != 0 IP protocol that matches this dp flow.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Cloudbase ≫ Open Vswitch Version >= 1.5.0 < 2.13.11
Cloudbase ≫ Open Vswitch Version >= 2.14.0 < 2.14.9
Cloudbase ≫ Open Vswitch Version >= 2.15.0 < 2.15.8
Cloudbase ≫ Open Vswitch Version >= 2.16.0 < 2.16.7
Cloudbase ≫ Open Vswitch Version >= 2.17.0 < 2.17.6
Cloudbase ≫ Open Vswitch Version >= 3.0.0 < 3.0.4
Cloudbase ≫ Open Vswitch Version3.1.0
Debian ≫ Debian Linux Version11.0
Redhat ≫ Openshift Container Platform Version4.0
Redhat ≫ Openstack Platform Version16.1
Redhat ≫ Openstack Platform Version16.2
Redhat ≫ Openstack Platform Version17.0
Redhat ≫ Virtualization Version4.0
Redhat ≫ Fast Datapath Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.09% | 0.267 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 8.2 | 3.9 | 4.2 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 8.2 | 3.9 | 4.2 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
|
CWE-670 Always-Incorrect Control Flow Implementation
The code contains a control flow path that does not reflect the algorithm that the path is intended to implement, leading to incorrect behavior any time this path is navigated.