First published: Tue Sep 25 2018(Updated: )
An issue was discovered in Open vSwitch (OvS) 2.7.x through 2.7.6. The decode_bundle function inside lib/ofp-actions.c is affected by a buffer over-read issue during BUNDLE action decoding. Upstream Patch: <a href="https://nvd.nist.gov/vuln/detail/CVE-2018-17206">https://nvd.nist.gov/vuln/detail/CVE-2018-17206</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Open vSwitch | >=2.7.x<=2.7.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1632528 is considered moderate due to its potential for buffer over-read issues.
To fix REDHAT-BUG-1632528, update Open vSwitch to a version later than 2.7.6 where the vulnerability has been patched.
Open vSwitch versions 2.7.x through 2.7.6 are affected by REDHAT-BUG-1632528.
REDHAT-BUG-1632528 pertains to a buffer over-read issue during the decoding of BUNDLE actions in Open vSwitch.
Additional information about REDHAT-BUG-1632528 can be found in the Red Hat bug report and related security advisories.