Show filters
22 Total Results
Displaying 1-10 of 22
Sort by:
Attacker Value
Unknown

CVE-2023-3966

Disclosure Date: February 22, 2024 (last updated February 23, 2024)
A flaw was found in Open vSwitch where multiple versions are vulnerable to crafted Geneve packets, which may result in a denial of service and invalid memory accesses. Triggering this issue requires that hardware offloading via the netlink path is enabled.
0
Attacker Value
Unknown

CVE-2024-22563

Disclosure Date: January 19, 2024 (last updated January 26, 2024)
openvswitch 2.17.8 was discovered to contain a memory leak via the function xmalloc__ in openvswitch-2.17.8/lib/util.c.
Attacker Value
Unknown

CVE-2023-5366

Disclosure Date: October 06, 2023 (last updated October 13, 2023)
A flaw was found in Open vSwitch that allows ICMPv6 Neighbor Advertisement packets between virtual machines to bypass OpenFlow rules. This issue may allow a local attacker to create specially crafted packets with a modified or spoofed target IP address field that can redirect ICMPv6 traffic to arbitrary IP addresses.
Attacker Value
Unknown

CVE-2022-4338

Disclosure Date: January 10, 2023 (last updated October 08, 2023)
An integer underflow in Organization Specific TLV was found in various versions of OpenvSwitch.
Attacker Value
Unknown

CVE-2022-4337

Disclosure Date: January 10, 2023 (last updated October 08, 2023)
An out-of-bounds read in Organization Specific TLV was found in various versions of OpenvSwitch.
Attacker Value
Unknown

CVE-2019-25076

Disclosure Date: September 08, 2022 (last updated October 08, 2023)
The TSS (Tuple Space Search) algorithm in Open vSwitch 2.x through 2.17.2 and 3.0.0 allows remote attackers to cause a denial of service (delays of legitimate traffic) via crafted packet data that requires excessive evaluation time within the packet classification algorithm for the MegaFlow cache, aka a Tuple Space Explosion (TSE) attack.
Attacker Value
Unknown

CVE-2022-0669

Disclosure Date: August 29, 2022 (last updated October 08, 2023)
A flaw was found in dpdk. This flaw allows a malicious vhost-user master to attach an unexpected number of fds as ancillary data to VHOST_USER_GET_INFLIGHT_FD / VHOST_USER_SET_INFLIGHT_FD messages that are not closed by the vhost-user slave. By sending such messages continuously, the vhost-user master exhausts available fd in the vhost-user slave process, leading to a denial of service.
Attacker Value
Unknown

CVE-2021-3905

Disclosure Date: August 23, 2022 (last updated October 08, 2023)
A memory leak was found in Open vSwitch (OVS) during userspace IP fragmentation processing. An attacker could use this flaw to potentially exhaust available memory by keeping sending packet fragments.
Attacker Value
Unknown

CVE-2021-36980

Disclosure Date: July 20, 2021 (last updated November 26, 2023)
Open vSwitch (aka openvswitch) 2.11.0 through 2.15.0 has a use-after-free in decode_NXAST_RAW_ENCAP (called from ofpact_decode and ofpacts_decode) during the decoding of a RAW_ENCAP action.
Attacker Value
Unknown

CVE-2020-27827

Disclosure Date: March 18, 2021 (last updated November 08, 2023)
A flaw was found in multiple versions of OpenvSwitch. Specially crafted LLDP packets can cause memory to be lost when allocating data to handle specific optional TLVs, potentially causing a denial of service. The highest threat from this vulnerability is to system availability.