ALT-PU-2017-2350-1
Package openvswitch updated to version 2.7.2-alt0.M80C.1 for branch c8 in task 189231.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2016-2074
Buffer overflow in lib/flow.c in ovs-vswitchd in Open vSwitch 2.2.x and 2.3.x before 2.3.3 and 2.4.x before 2.4.1 allows remote attackers to execute arbitrary code via crafted MPLS packets, as demonstrated by a long string in an ovs-appctl command.
- [ovs-announce] 20160328 CVE-2016-2074: MPLS buffer overflow vulnerabilities in Open vSwitch
- [ovs-announce] 20160328 CVE-2016-2074: MPLS buffer overflow vulnerabilities in Open vSwitch
- [ovs-announce] 20160328 Open vSwitch 2.4.1 and 2.3.3 Available
- [ovs-announce] 20160328 Open vSwitch 2.4.1 and 2.3.3 Available
- RHSA-2016:0523
- RHSA-2016:0523
- RHSA-2016:0524
- RHSA-2016:0524
- RHSA-2016:0537
- RHSA-2016:0537
- DSA-3533
- DSA-3533
- 85700
- 85700
- RHSA-2016:0615
- RHSA-2016:0615
- https://bugzilla.redhat.com/show_bug.cgi?id=1318553
- https://bugzilla.redhat.com/show_bug.cgi?id=1318553
- GLSA-201701-07
- GLSA-201701-07
- https://security-tracker.debian.org/tracker/CVE-2016-2074
- https://security-tracker.debian.org/tracker/CVE-2016-2074
- https://support.citrix.com/article/CTX232655
- https://support.citrix.com/article/CTX232655
Modified: 2024-11-21
CVE-2017-9214
In Open vSwitch (OvS) 2.7.0, while parsing an OFPT_QUEUE_GET_CONFIG_REPLY type OFP 1.0 message, there is a buffer over-read that is caused by an unsigned integer underflow in the function `ofputil_pull_queue_get_config_reply10` in `lib/ofp-util.c`.
- RHSA-2017:2418
- RHSA-2017:2418
- RHSA-2017:2553
- RHSA-2017:2553
- RHSA-2017:2648
- RHSA-2017:2648
- RHSA-2017:2665
- RHSA-2017:2665
- RHSA-2017:2692
- RHSA-2017:2692
- RHSA-2017:2698
- RHSA-2017:2698
- RHSA-2017:2727
- RHSA-2017:2727
- [debian-lts-announce] 20210219 [SECURITY] [DLA 2571-1] openvswitch security update
- [debian-lts-announce] 20210219 [SECURITY] [DLA 2571-1] openvswitch security update
- https://mail.openvswitch.org/pipermail/ovs-dev/2017-May/332711.html
- https://mail.openvswitch.org/pipermail/ovs-dev/2017-May/332711.html
Modified: 2024-11-21
CVE-2017-9263
In Open vSwitch (OvS) 2.7.0, while parsing an OpenFlow role status message, there is a call to the abort() function for undefined role status reasons in the function `ofp_print_role_status_message` in `lib/ofp-print.c` that may be leveraged toward a remote DoS attack by a malicious switch.
- RHSA-2017:2418
- RHSA-2017:2418
- RHSA-2017:2553
- RHSA-2017:2553
- RHSA-2017:2648
- RHSA-2017:2648
- RHSA-2017:2665
- RHSA-2017:2665
- RHSA-2017:2692
- RHSA-2017:2692
- RHSA-2017:2698
- RHSA-2017:2698
- RHSA-2017:2727
- RHSA-2017:2727
- https://mail.openvswitch.org/pipermail/ovs-dev/2017-May/332966.html
- https://mail.openvswitch.org/pipermail/ovs-dev/2017-May/332966.html
Modified: 2024-11-21
CVE-2017-9265
In Open vSwitch (OvS) v2.7.0, there is a buffer over-read while parsing the group mod OpenFlow message sent from the controller in `lib/ofp-util.c` in the function `ofputil_pull_ofp15_group_mod`.
- RHSA-2017:2418
- RHSA-2017:2418
- RHSA-2017:2553
- RHSA-2017:2553
- RHSA-2017:2648
- RHSA-2017:2648
- RHSA-2017:2665
- RHSA-2017:2665
- RHSA-2017:2692
- RHSA-2017:2692
- RHSA-2017:2698
- RHSA-2017:2698
- RHSA-2017:2727
- RHSA-2017:2727
- https://mail.openvswitch.org/pipermail/ovs-dev/2017-May/332965.html
- https://mail.openvswitch.org/pipermail/ovs-dev/2017-May/332965.html
Modified: 2024-11-21
CVE-2022-32166
In ovs versions v0.90.0 through v2.5.0 are vulnerable to heap buffer over-read in flow.c. An unsafe comparison of “minimasks” function could lead access to an unmapped region of memory. This vulnerability is capable of crashing the software, memory modification, and possible remote execution.
- https://github.com/cloudbase/ovs/commit/2ed6505555cdcb46f9b1f0329d1491b75290fc73
- https://github.com/cloudbase/ovs/commit/2ed6505555cdcb46f9b1f0329d1491b75290fc73
- [debian-lts-announce] 20221029 [SECURITY] [DLA 3168-1] openvswitch security update
- [debian-lts-announce] 20221029 [SECURITY] [DLA 3168-1] openvswitch security update
- https://www.mend.io/vulnerability-database/CVE-2022-32166
- https://www.mend.io/vulnerability-database/CVE-2022-32166