A flaw was found in Open vSwitch where multiple versions are vulnerable to crafted Geneve packets, which may result in a denial of service and invalid memory accesses. Triggering this issue requires that hardware offloading via the netlink path is enabled.
References
| Link | Resource |
|---|---|
| https://access.redhat.com/security/cve/CVE-2023-3966 | Third Party Advisory |
| https://bugzilla.redhat.com/show_bug.cgi?id=2178363 | Third Party Advisory |
| https://lists.fedoraproject.org/archives/list/[email protected]/message/LFZADABUDOFI2KZIRQBYFZCIKH55RGY3/ | Mailing List |
| https://lists.fedoraproject.org/archives/list/[email protected]/message/VYYUBF6OW2JG7VOFEOROHXGSJCTES3QO/ | Mailing List |
| https://access.redhat.com/security/cve/CVE-2023-3966 | Third Party Advisory |
| https://bugzilla.redhat.com/show_bug.cgi?id=2178363 | Third Party Advisory |
| https://lists.fedoraproject.org/archives/list/[email protected]/message/LFZADABUDOFI2KZIRQBYFZCIKH55RGY3/ | Mailing List |
| https://lists.fedoraproject.org/archives/list/[email protected]/message/VYYUBF6OW2JG7VOFEOROHXGSJCTES3QO/ | Mailing List |
Configurations
History
No history.
Information
Published : 2024-02-22 13:15
Updated : 2025-05-16 14:17
NVD link : CVE-2023-3966
Mitre link : CVE-2023-3966
CVE.ORG link : CVE-2023-3966
JSON object : View
Products Affected
fedoraproject
- fedora
openvswitch
- openvswitch
CWE
CWE-248
Uncaught Exception
