Open vSwitch 2.15.5

CPE Details

Open vSwitch 2.15.5
2.15.5
2022-08-25
11h58 +00:00
2022-08-25
12h41 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:openvswitch:openvswitch:2.15.5:*:*:*:*:*:*:*

Informations

Vendor

openvswitch

Product

openvswitch

Version

2.15.5

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2023-5366 2023-10-06 17h43 +00:00 A flaw was found in Open vSwitch that allows ICMPv6 Neighbor Advertisement packets between virtual machines to bypass OpenFlow rules. This issue may allow a local attacker to create specially crafted packets with a modified or spoofed target IP address field that can redirect ICMPv6 traffic to arbitrary IP addresses.
7.1
High
CVE-2022-4337 2023-01-09 23h00 +00:00 An out-of-bounds read in Organization Specific TLV was found in various versions of OpenvSwitch.
9.8
Critical
CVE-2022-4338 2023-01-09 23h00 +00:00 An integer underflow in Organization Specific TLV was found in various versions of OpenvSwitch.
9.8
Critical
CVE-2019-25076 2022-09-08 20h08 +00:00 The TSS (Tuple Space Search) algorithm in Open vSwitch 2.x through 2.17.2 and 3.0.0 allows remote attackers to cause a denial of service (delays of legitimate traffic) via crafted packet data that requires excessive evaluation time within the packet classification algorithm for the MegaFlow cache, aka a Tuple Space Explosion (TSE) attack.
5.8
Medium
CVE-2021-3905 2022-08-22 22h00 +00:00 A memory leak was found in Open vSwitch (OVS) during userspace IP fragmentation processing. An attacker could use this flaw to potentially exhaust available memory by keeping sending packet fragments.
7.5
High