Import Source
https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-35087.json
JSON Data
https://api.test.osv.dev/v1/vulns/AZL-35087
Upstream
Published
2023-10-06T18:15:12Z
Modified
2026-04-01T05:11:53.622261Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
Summary
CVE-2023-5366 affecting package openvswitch for versions less than 3.3.0-1
Details

A flaw was found in Open vSwitch that allows ICMPv6 Neighbor Advertisement packets between virtual machines to bypass OpenFlow rules. This issue may allow a local attacker to create specially crafted packets with a modified or spoofed target IP address field that can redirect ICMPv6 traffic to arbitrary IP addresses.

References

Affected packages

Azure Linux:3 / openvswitch

Package

Name
openvswitch
Purl
pkg:rpm/azure-linux/openvswitch

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.3.0-1

Database specific

source
"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-35087.json"