Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-9214

Опубликовано: 23 мая 2017
Источник: debian
EPSS Низкий

Описание

In Open vSwitch (OvS) 2.7.0, while parsing an OFPT_QUEUE_GET_CONFIG_REPLY type OFP 1.0 message, there is a buffer over-read that is caused by an unsigned integer underflow in the function `ofputil_pull_queue_get_config_reply10` in `lib/ofp-util.c`.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
openvswitchfixed2.8.1+dfsg1-1experimentalpackage
openvswitchfixed2.8.1+dfsg1-2package
openvswitchnot-affectedjessiepackage
openvswitchnot-affectedwheezypackage

Примечания

  • https://mail.openvswitch.org/pipermail/ovs-dev/2017-May/332711.html

EPSS

Процентиль: 87%
0.0339
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 8 лет назад

In Open vSwitch (OvS) 2.7.0, while parsing an OFPT_QUEUE_GET_CONFIG_REPLY type OFP 1.0 message, there is a buffer over-read that is caused by an unsigned integer underflow in the function `ofputil_pull_queue_get_config_reply10` in `lib/ofp-util.c`.

CVSS3: 7.5
redhat
больше 8 лет назад

In Open vSwitch (OvS) 2.7.0, while parsing an OFPT_QUEUE_GET_CONFIG_REPLY type OFP 1.0 message, there is a buffer over-read that is caused by an unsigned integer underflow in the function `ofputil_pull_queue_get_config_reply10` in `lib/ofp-util.c`.

CVSS3: 9.8
nvd
больше 8 лет назад

In Open vSwitch (OvS) 2.7.0, while parsing an OFPT_QUEUE_GET_CONFIG_REPLY type OFP 1.0 message, there is a buffer over-read that is caused by an unsigned integer underflow in the function `ofputil_pull_queue_get_config_reply10` in `lib/ofp-util.c`.

CVSS3: 9.8
github
больше 3 лет назад

In Open vSwitch (OvS) 2.7.0, while parsing an OFPT_QUEUE_GET_CONFIG_REPLY type OFP 1.0 message, there is a buffer over-read that is caused by an unsigned integer underflow in the function `ofputil_pull_queue_get_config_reply10` in `lib/ofp-util.c`.

suse-cvrf
около 8 лет назад

Security update for openvswitch

EPSS

Процентиль: 87%
0.0339
Низкий