Open vSwitch 2.17.1

CPE Details

Open vSwitch 2.17.1
2.17.1
2022-08-25
11h58 +00:00
2022-08-25
12h41 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:openvswitch:openvswitch:2.17.1:*:*:*:*:*:*:*

Informations

Vendor

openvswitch

Product

openvswitch

Version

2.17.1

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2023-5366 2023-10-06 17h43 +00:00 A flaw was found in Open vSwitch that allows ICMPv6 Neighbor Advertisement packets between virtual machines to bypass OpenFlow rules. This issue may allow a local attacker to create specially crafted packets with a modified or spoofed target IP address field that can redirect ICMPv6 traffic to arbitrary IP addresses.
7.1
High
CVE-2022-4337 2023-01-09 23h00 +00:00 An out-of-bounds read in Organization Specific TLV was found in various versions of OpenvSwitch.
9.8
Critical
CVE-2022-4338 2023-01-09 23h00 +00:00 An integer underflow in Organization Specific TLV was found in various versions of OpenvSwitch.
9.8
Critical
CVE-2019-25076 2022-09-08 20h08 +00:00 The TSS (Tuple Space Search) algorithm in Open vSwitch 2.x through 2.17.2 and 3.0.0 allows remote attackers to cause a denial of service (delays of legitimate traffic) via crafted packet data that requires excessive evaluation time within the packet classification algorithm for the MegaFlow cache, aka a Tuple Space Explosion (TSE) attack.
5.8
Medium