9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
ovs is vulnerable to integer underflows. The library does not properly check memory size in the ofputil_pull_queue_get_config_reply10()
function in lib\ofp-util.c
, causing an integer underflow that can crash the application or overwrite memory.
access.redhat.com/errata/RHSA-2017:2418
access.redhat.com/errata/RHSA-2017:2553
access.redhat.com/errata/RHSA-2017:2648
access.redhat.com/errata/RHSA-2017:2665
access.redhat.com/errata/RHSA-2017:2692
access.redhat.com/errata/RHSA-2017:2698
access.redhat.com/errata/RHSA-2017:2727
access.redhat.com/security/updates/classification/#moderate
bugzilla.redhat.com/show_bug.cgi?id=1472729
bugzilla.redhat.com/show_bug.cgi?id=1472854
lists.debian.org/debian-lts-announce/2021/02/msg00032.html
mail.openvswitch.org/pipermail/ovs-dev/2017-May/332711.html
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P