First published: Tue May 30 2017(Updated: )
A vulnerability in openvswitch was found. While parsing an OFPT_QUEUE_GET_CONFIG_REPLY type OFP 1.0 message, there is a buffer over-read that is caused by an unsigned integer underflow in the function `ofputil_pull_queue_get_config_reply10` in `lib/ofp-util.c`. References: <a href="https://mail.openvswitch.org/pipermail/ovs-dev/2017-May/332711.html">https://mail.openvswitch.org/pipermail/ovs-dev/2017-May/332711.html</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Open vSwitch |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1456795 is classified as high due to the potential for a buffer over-read.
To fix REDHAT-BUG-1456795, it is recommended to update Open vSwitch to the latest patched version provided by the vendor.
REDHAT-BUG-1456795 affects the Open vSwitch software but specific version numbers are not listed in the provided information.
REDHAT-BUG-1456795 is a buffer over-read vulnerability caused by an unsigned integer underflow.
Yes, REDHAT-BUG-1456795 can potentially lead to security breaches if exploited, as it may allow unauthorized access to sensitive data.