First published: Wed May 31 2017(Updated: )
In Open vSwitch there is a buffer over-read while parsing the group mod OpenFlow message sent from the controller in `lib/ofp-util.c` in the function `ofputil_pull_ofp15_group_mod`. References: <a href="https://mail.openvswitch.org/pipermail/ovs-dev/2017-May/332965.html">https://mail.openvswitch.org/pipermail/ovs-dev/2017-May/332965.html</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Open vSwitch |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1457335 is classified as high due to the potential for buffer over-read vulnerabilities.
To fix REDHAT-BUG-1457335, update Open vSwitch to the latest version that includes the security patch.
REDHAT-BUG-1457335 affects all versions of Open vSwitch that are vulnerable to the buffer over-read issue.
REDHAT-BUG-1457335 is a buffer over-read vulnerability that occurs while parsing the group mod OpenFlow message.
There is no official workaround for REDHAT-BUG-1457335, and applying the relevant patches is the recommended action.