First published: Wed Sep 28 2022(Updated: )
In ovs versions v0.90.0 through v2.5.0 are vulnerable to heap buffer over-read in flow.c. An unsafe comparison of “minimasks” function could lead access to an unmapped region of memory. This vulnerability is capable of crashing the software, memory modification, and possible remote execution.
Credit: vulnerabilitylab@mend.io
Affected Software | Affected Version | How to fix |
---|---|---|
Cloudbase Open Vswitch | >=0.90.0<=2.5.0 | |
Debian Debian Linux | =10.0 |
Update version to v2.5.1 or later
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-32166 is high.
The affected software of CVE-2022-32166 includes Cloudbase Open Vswitch and Debian Debian Linux.
CVE-2022-32166 is a heap buffer over-read vulnerability in ovs versions v0.90.0 through v2.5.0, which can lead to crashes, memory modification, and possible remote execution.
To fix CVE-2022-32166, update ovs to a version higher than v2.5.0.
Yes, you can find more information about CVE-2022-32166 in the references provided: [1](https://github.com/cloudbase/ovs/commit/2ed6505555cdcb46f9b1f0329d1491b75290fc73), [2](https://lists.debian.org/debian-lts-announce/2022/10/msg00036.html), [3](https://www.mend.io/vulnerability-database/CVE-2022-32166).