Lucene search

K
ubuntucveUbuntu.comUB:CVE-2023-3966
HistoryFeb 08, 2024 - 12:00 a.m.

CVE-2023-3966

2024-02-0800:00:00
ubuntu.com
ubuntu.com
13
open vswitch
geneve packets
denial of service
memory accesses
netlink hardware offloading

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0

Percentile

15.5%

A flaw was found in Open vSwitch where multiple versions are vulnerable to
crafted Geneve packets, which may result in a denial of service and invalid
memory accesses. Triggering this issue requires that hardware offloading
via the netlink path is enabled.

Bugs

Notes

Author Note
amurray According to the upstream advisory only affects version 2.12 and newer but the mentioned commit which introduced this bug (https://github.com/openvswitch/ovs/commit/a468645c6d33) was shipped in 2.11.0 as well so assuming this is also affected.
OSVersionArchitecturePackageVersionFilename
ubuntu20.04noarchopenvswitch< 2.13.8-0ubuntu1.4UNKNOWN
ubuntu22.04noarchopenvswitch< 2.17.9-0ubuntu0.22.04.1UNKNOWN
ubuntu23.10noarchopenvswitch< 3.2.2-0ubuntu0.23.10.1UNKNOWN
ubuntu24.04noarchopenvswitch< 3.3.0~git20240118.e802fe7-3ubuntu1UNKNOWN

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0

Percentile

15.5%