First published: Thu Dec 29 2022(Updated: )
An out-of-bounds read in Organization Specific TLV was found in various versions of OpenvSwitch.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Openvswitch Openvswitch | <2.13.10 | |
Openvswitch Openvswitch | >=2.14.0<2.14.8 | |
Openvswitch Openvswitch | >=2.15.0<2.15.7 | |
Openvswitch Openvswitch | >=2.16.0<2.16.6 | |
Openvswitch Openvswitch | >=2.17.0<2.17.5 | |
Openvswitch Openvswitch | >=3.0.0<3.0.3 | |
Debian Debian Linux | =11.0 | |
debian/openvswitch | <=2.10.7+ds1-0+deb10u1 | 2.10.7+ds1-0+deb10u4 2.15.0+ds1-2+deb11u4 3.1.0-2 3.2.2~git20231029-2 |
<2.13.10 | ||
>=2.14.0<2.14.8 | ||
>=2.15.0<2.15.7 | ||
>=2.16.0<2.16.6 | ||
>=2.17.0<2.17.5 | ||
>=3.0.0<3.0.3 | ||
=11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-4337 is an out-of-bounds read vulnerability in Organization Specific TLV found in various versions of OpenvSwitch.
Versions up to and including 2.13.10, versions from 2.14.0 to 2.14.8, versions from 2.15.0 to 2.15.7, versions from 2.16.0 to 2.16.6, versions from 2.17.0 to 2.17.5, and versions from 3.0.0 to 3.0.3 of OpenvSwitch are affected by CVE-2022-4337.
CVE-2022-4337 has a severity rating of 9.8 (critical).
To fix CVE-2022-4337 in OpenvSwitch, update to version 2.10.7+ds1-0+deb10u4, 2.15.0+ds1-2+deb11u4, 3.1.0-2, or 3.2.0-2 if using the Debian package.
More information about CVE-2022-4337 can be found at the following references: [1](https://github.com/openvswitch/ovs/pull/405), [2](https://security-tracker.debian.org/tracker/CVE-2022-4337), [3](https://security-tracker.debian.org/tracker/CVE-2022-4338).