First published: Sun Nov 26 2023(Updated: )
It was discovered that Open vSwitch did not correctly handle OpenFlow rules for ICMPv6 Neighbour Advertisement packets. A local attacker could possibly use this issue to redirect traffic to arbitrary IP addresses.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/openvswitch-common | <2.13.8-0ubuntu1.3 | 2.13.8-0ubuntu1.3 |
Ubuntu Ubuntu | =20.04 | |
All of | ||
ubuntu/openvswitch-common | <2.9.8-0ubuntu0.18.04.5+esm1 | 2.9.8-0ubuntu0.18.04.5+esm1 |
Ubuntu Ubuntu | =18.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is USN-6514-1.
The vulnerability allows a local attacker to redirect traffic to arbitrary IP addresses.
The local attacker can exploit the vulnerability by manipulating OpenFlow rules for ICMPv6 Neighbour Advertisement packets.
The versions affected are openvswitch-common 2.13.8-0ubuntu1.3 and openvswitch-common 2.9.8-0ubuntu0.18.04.5+esm1.
To fix the vulnerability, update to version 2.13.8-0ubuntu1.3 for Ubuntu 20.04 or version 2.9.8-0ubuntu0.18.04.5+esm1 for Ubuntu 18.04.