First published: Tue May 23 2017(Updated: )
A vulnerability in openvswitch was found. While parsing an OFPT_QUEUE_GET_CONFIG_REPLY type OFP 1.0 message, there is a buffer over-read that is caused by an unsigned integer underflow in the function `ofputil_pull_queue_get_config_reply10` in `lib/ofp-util.c`. References: <a href="https://mail.openvswitch.org/pipermail/ovs-dev/2017-May/332711.html">https://mail.openvswitch.org/pipermail/ovs-dev/2017-May/332711.html</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Openvswitch Openvswitch | =2.7.0 | |
Debian Debian Linux | =9.0 | |
Redhat Openstack | =6.0 | |
Redhat Openstack | =7.0 | |
Redhat Openstack | =8 | |
Redhat Openstack | =9 | |
Redhat Openstack | =10 | |
Redhat Openstack | =11 | |
Redhat Virtualization | =4.1 | |
Redhat Virtualization Manager | =4.1 | |
Redhat Virtualization | =4.0 | |
Redhat Enterprise Linux | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.