32.Lock Code Circular

It was discovered that Open vSwitch could be made to stop forwarding packets if it received specially crafted network traffic (CVE-2023-1668). Due to its high availability impact and the low attack complexity required to exploit the bug, this vulnerability has received a National Vulnerability Database (NVD) base score of 8.2 out of 10 (“High” severity).

A remote attacker could possibly use this issue to cause a denial of service (DoS), resulting in loss of access to your critical systems. 

An important update for Open vSwitch that fixes this dangerous vulnerability has been released. We urge all impacted users to apply the Open vSwitch updates issued by their distro(s) now to protect against attacks leading to loss of access and potential compromise.

To stay on top of important updates released by the open-source programs and applications you use, be sure to register as a LinuxSecurity user, then subscribe to our Linux Advisory Watch newsletter and customize your advisories for the distro(s) you use. This will enable you to stay up-to-date on the latest, most significant issues impacting the security of your systems.

Follow @LS_Advisories on Twitter for real-time updates on advisories for your distro(s).