{"id":"CVE-2023-5366","details":"A flaw was found in Open vSwitch that allows ICMPv6 Neighbor Advertisement packets between virtual machines to bypass OpenFlow rules. This issue may allow a local attacker to create specially crafted packets with a modified or spoofed target IP address field that can redirect ICMPv6 traffic to arbitrary IP addresses.","modified":"2026-03-13T07:48:15.765069Z","published":"2023-10-06T18:15:12.520Z","related":["SUSE-SU-2023:4508-1","SUSE-SU-2023:4571-1","SUSE-SU-2023:4573-1","SUSE-SU-2023:4657-1","SUSE-SU-2023:4661-1","SUSE-SU-2023:4666-1","SUSE-SU-2023:4714-1","SUSE-SU-2026:0280-1","SUSE-SU-2026:0290-1","SUSE-SU-2026:20049-1","SUSE-SU-2026:20061-1","openSUSE-SU-2024:13657-1"],"references":[{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2024/02/08/4"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/02/msg00004.html"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LFZADABUDOFI2KZIRQBYFZCIKH55RGY3/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VYYUBF6OW2JG7VOFEOROHXGSJCTES3QO/"},{"type":"ADVISORY","url":"https://access.redhat.com/security/cve/CVE-2023-5366"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2006347"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"2023-02-28"}]},{"events":[{"introduced":"0"},{"last_affected":"4.0"}]},{"events":[{"introduced":"0"},{"last_affected":"4.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-5366.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"}]}