First published: Tue May 23 2017(Updated: )
A vulnerability in openvswitch was found. While parsing an OFPT_QUEUE_GET_CONFIG_REPLY type OFP 1.0 message, there is a buffer over-read that is caused by an unsigned integer underflow in the function `ofputil_pull_queue_get_config_reply10` in `lib/ofp-util.c`. References: <a href="https://mail.openvswitch.org/pipermail/ovs-dev/2017-May/332711.html">https://mail.openvswitch.org/pipermail/ovs-dev/2017-May/332711.html</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Open vSwitch | =2.7.0 | |
Debian Linux | =9.0 | |
Red Hat OpenStack for IBM Power | =6.0 | |
Red Hat OpenStack for IBM Power | =7.0 | |
Red Hat OpenStack for IBM Power | =8 | |
Red Hat OpenStack for IBM Power | =9 | |
Red Hat OpenStack for IBM Power | =10 | |
Red Hat OpenStack for IBM Power | =11 | |
Red Hat Enterprise Virtualization | =4.1 | |
Red Hat Enterprise Virtualization Manager | =4.1 | |
Red Hat Enterprise Virtualization | =4.0 | |
Red Hat Enterprise Linux | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-9214 is considered to have a high severity due to its potential for buffer over-read, which could lead to application crashes or information leaks.
To fix CVE-2017-9214, you should update Open vSwitch to the latest version that contains the security patch for this vulnerability.
CVE-2017-9214 affects Open vSwitch versions 2.7.0 and various versions of Red Hat OpenStack and Red Hat Enterprise Virtualization.
Yes, CVE-2017-9214 can be potentially exploited remotely if an attacker can send crafted OFP messages to the affected Open vSwitch instance.
CVE-2017-9214 is classified as a buffer over-read vulnerability resulting from an unsigned integer underflow.