CVE-2023-1668 — Always-Incorrect Control Flow Implementation in Openvswitch
Severity
8.2HIGHNVD
EPSS
0.3%
top 44.88%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 10
Latest updateSep 21
Description
A flaw was found in openvswitch (OVS). When processing an IP packet with protocol 0, OVS will install the datapath flow without the action modifying the IP header. This issue results (for both kernel and userspace datapath) in installing a datapath flow matching all IP protocols (nw_proto is wildcarded) for this flow, but with an incorrect action, possibly causing incorrect handling of other IP packets with a != 0 IP protocol that matches this dp flow.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:HExploitability: 3.9 | Impact: 4.2
Affected Packages5 packages
Also affects: Debian Linux 11.0, Openshift Container Platform 4.0
Patches
🔴Vulnerability Details
4📋Vendor Advisories
4Microsoft▶
A flaw was found in openvswitch (OVS). When processing an IP packet with protocol 0 OVS will install the datapath flow without the action modifying the IP header. This issue results (for both kernel a↗2023-04-11
Debian▶
CVE-2023-1668: openvswitch - A flaw was found in openvswitch (OVS). When processing an IP packet with protoco...↗2023