Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

CVE ID:CVE-2023-1668
Description:A flaw was found in openvswitch (OVS). When processing an IP packet with protocol 0, OVS will install the datapath flow without the action modifying the IP header. This issue results (for both kernel and userspace datapath) in installing a datapath flow matching all IP protocols (nw_proto is wildcarded) for this flow, but with an incorrect action, possibly causing incorrect handling of other IP packets with a != 0 IP protocol that matches this dp flow.
Test IDs: 1.3.6.1.4.1.25623.1.1.12.2023.6068.1   1.3.6.1.4.1.25623.1.1.1.1.2023.5387   1.3.6.1.4.1.25623.1.0.827587   1.3.6.1.4.1.25623.1.1.1.2.2023.3410   1.3.6.1.4.1.25623.1.1.4.2023.2621.1  
Cross References: Common Vulnerability Exposure (CVE) ID: CVE-2023-1668
Debian Security Information: DSA-5387 (Google Search)
https://www.debian.org/security/2023/dsa-5387
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V2GUNS3WSJG4TUDKZ5L7FXGJMVOD6EJZ/
https://security.gentoo.org/glsa/202311-16
https://bugzilla.redhat.com/show_bug.cgi?id=2137666
https://bugzilla.redhat.com/show_bug.cgi?id=2137666
https://www.openwall.com/lists/oss-security/2023/04/06/1
https://www.openwall.com/lists/oss-security/2023/04/06/1
https://lists.debian.org/debian-lts-announce/2023/05/msg00000.html




© 1998-2025 E-Soft Inc. All rights reserved.