Import Source
https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-26031.json
JSON Data
https://api.test.osv.dev/v1/vulns/AZL-26031
Upstream
Published
2023-04-10T22:15:09Z
Modified
2026-04-01T05:08:12.532800Z
Severity
  • 8.2 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H CVSS Calculator
Summary
CVE-2023-1668 affecting package openvswitch for versions less than 2.17.5-2
Details

A flaw was found in openvswitch (OVS). When processing an IP packet with protocol 0, OVS will install the datapath flow without the action modifying the IP header. This issue results (for both kernel and userspace datapath) in installing a datapath flow matching all IP protocols (nw_proto is wildcarded) for this flow, but with an incorrect action, possibly causing incorrect handling of other IP packets with a != 0 IP protocol that matches this dp flow.

References

Affected packages

Azure Linux:2 / openvswitch

Package

Name
openvswitch
Purl
pkg:rpm/azure-linux/openvswitch

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.17.5-2

Database specific

source
"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-26031.json"