CVE-2023-1668

A flaw was found in openvswitch (OVS). When processing an IP packet with protocol 0, OVS will install the datapath flow without the action modifying the IP header. This issue results (for both kernel and userspace datapath) in installing a datapath flow matching all IP protocols (nw_proto is wildcarded) for this flow, but with an incorrect action, possibly causing incorrect handling of other IP packets with a != 0 IP protocol that matches this dp flow.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
8.2 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
redhatCNA
---
---
CVEADP
---
---
CISA-ADPADP
8.2 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 23%
VendorProductVersion
cloudbaseopen_vswitch
1.5.0 ≤
𝑥
< 2.13.11
cloudbaseopen_vswitch
2.14.0 ≤
𝑥
< 2.14.9
cloudbaseopen_vswitch
2.15.0 ≤
𝑥
< 2.15.8
cloudbaseopen_vswitch
2.16.0 ≤
𝑥
< 2.16.7
cloudbaseopen_vswitch
2.17.0 ≤
𝑥
< 2.17.6
cloudbaseopen_vswitch
3.0.0 ≤
𝑥
< 3.0.4
cloudbaseopen_vswitch
3.1.0
debiandebian_linux
11.0
redhatopenshift_container_platform
4.0
redhatopenstack_platform
16.1
redhatopenstack_platform
16.2
redhatopenstack_platform
17.0
redhatvirtualization
4.0
redhatfast_datapath
-
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
openvswitch
bullseye (security)
2.15.0+ds1-2+deb11u5
fixed
bullseye
2.15.0+ds1-2+deb11u5
fixed
bookworm
3.1.0-2+deb12u1
fixed
bookworm (security)
3.1.0-2+deb12u1
fixed
trixie
3.5.0~git20241129.2af7cef-2
fixed
sid
3.5.0~git20241129.2af7cef-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
openvswitch
oracular
Fixed 3.1.0-1ubuntu1
released
noble
Fixed 3.1.0-1ubuntu1
released
mantic
Fixed 3.1.0-1ubuntu1
released
lunar
Fixed 3.1.0-1ubuntu1
released
kinetic
Fixed 3.0.3-0ubuntu0.22.10.3
released
jammy
Fixed 2.17.5-0ubuntu0.22.04.2
released
focal
Fixed 2.13.8-0ubuntu1.2
released
bionic
Fixed 2.9.8-0ubuntu0.18.04.5
released
xenial
needs-triage
trusty
ignored