Количество 14
Количество 14
CVE-2023-1668
A flaw was found in openvswitch (OVS). When processing an IP packet with protocol 0, OVS will install the datapath flow without the action modifying the IP header. This issue results (for both kernel and userspace datapath) in installing a datapath flow matching all IP protocols (nw_proto is wildcarded) for this flow, but with an incorrect action, possibly causing incorrect handling of other IP packets with a != 0 IP protocol that matches this dp flow.
CVE-2023-1668
A flaw was found in openvswitch (OVS). When processing an IP packet with protocol 0, OVS will install the datapath flow without the action modifying the IP header. This issue results (for both kernel and userspace datapath) in installing a datapath flow matching all IP protocols (nw_proto is wildcarded) for this flow, but with an incorrect action, possibly causing incorrect handling of other IP packets with a != 0 IP protocol that matches this dp flow.
CVE-2023-1668
A flaw was found in openvswitch (OVS). When processing an IP packet with protocol 0, OVS will install the datapath flow without the action modifying the IP header. This issue results (for both kernel and userspace datapath) in installing a datapath flow matching all IP protocols (nw_proto is wildcarded) for this flow, but with an incorrect action, possibly causing incorrect handling of other IP packets with a != 0 IP protocol that matches this dp flow.
CVE-2023-1668
CVE-2023-1668
A flaw was found in openvswitch (OVS). When processing an IP packet wi ...
SUSE-SU-2023:2621-1
Security update for openvswitch
SUSE-SU-2023:2536-1
Security update for openvswitch3
SUSE-SU-2023:2296-1
Security update for openvswitch
GHSA-w6wj-g5cv-fh4w
A flaw was found in openvswitch (OVS). When processing an IP packet with protocol 0, OVS will install the datapath flow without the action modifying the IP header. This issue results (for both kernel and userspace datapath) in installing a datapath flow matching all IP protocols (nw_proto is wildcarded) for this flow, but with an incorrect action, possibly causing incorrect handling of other IP packets with a != 0 IP protocol that matches this dp flow.
BDU:2024-06943
Уязвимость программного многоуровневого коммутатора OpenvSwitch, связанная с реализацией некорректного потока управления, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании
SUSE-SU-2023:2275-1
Security update for openvswitch
SUSE-SU-2023:2274-1
Security update for openvswitch
SUSE-SU-2026:0290-1
Security update for openvswitch3
SUSE-SU-2026:0280-1
Security update for openvswitch
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2023-1668 A flaw was found in openvswitch (OVS). When processing an IP packet with protocol 0, OVS will install the datapath flow without the action modifying the IP header. This issue results (for both kernel and userspace datapath) in installing a datapath flow matching all IP protocols (nw_proto is wildcarded) for this flow, but with an incorrect action, possibly causing incorrect handling of other IP packets with a != 0 IP protocol that matches this dp flow. | CVSS3: 8.2 | 0% Низкий | почти 3 года назад | |
CVE-2023-1668 A flaw was found in openvswitch (OVS). When processing an IP packet with protocol 0, OVS will install the datapath flow without the action modifying the IP header. This issue results (for both kernel and userspace datapath) in installing a datapath flow matching all IP protocols (nw_proto is wildcarded) for this flow, but with an incorrect action, possibly causing incorrect handling of other IP packets with a != 0 IP protocol that matches this dp flow. | CVSS3: 8.2 | 0% Низкий | почти 3 года назад | |
CVE-2023-1668 A flaw was found in openvswitch (OVS). When processing an IP packet with protocol 0, OVS will install the datapath flow without the action modifying the IP header. This issue results (for both kernel and userspace datapath) in installing a datapath flow matching all IP protocols (nw_proto is wildcarded) for this flow, but with an incorrect action, possibly causing incorrect handling of other IP packets with a != 0 IP protocol that matches this dp flow. | CVSS3: 8.2 | 0% Низкий | почти 3 года назад | |
CVSS3: 8.2 | 0% Низкий | почти 3 года назад | ||
CVE-2023-1668 A flaw was found in openvswitch (OVS). When processing an IP packet wi ... | CVSS3: 8.2 | 0% Низкий | почти 3 года назад | |
SUSE-SU-2023:2621-1 Security update for openvswitch | 0% Низкий | больше 2 лет назад | ||
SUSE-SU-2023:2536-1 Security update for openvswitch3 | 0% Низкий | больше 2 лет назад | ||
SUSE-SU-2023:2296-1 Security update for openvswitch | 0% Низкий | больше 2 лет назад | ||
GHSA-w6wj-g5cv-fh4w A flaw was found in openvswitch (OVS). When processing an IP packet with protocol 0, OVS will install the datapath flow without the action modifying the IP header. This issue results (for both kernel and userspace datapath) in installing a datapath flow matching all IP protocols (nw_proto is wildcarded) for this flow, but with an incorrect action, possibly causing incorrect handling of other IP packets with a != 0 IP protocol that matches this dp flow. | CVSS3: 8.2 | 0% Низкий | почти 3 года назад | |
BDU:2024-06943 Уязвимость программного многоуровневого коммутатора OpenvSwitch, связанная с реализацией некорректного потока управления, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании | CVSS3: 8.2 | 0% Низкий | почти 3 года назад | |
SUSE-SU-2023:2275-1 Security update for openvswitch | больше 2 лет назад | |||
SUSE-SU-2023:2274-1 Security update for openvswitch | больше 2 лет назад | |||
SUSE-SU-2026:0290-1 Security update for openvswitch3 | 15 дней назад | |||
SUSE-SU-2026:0280-1 Security update for openvswitch | 18 дней назад |
Уязвимостей на страницу