Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Openvswitch
(Openvswitch)Repositories | https://github.com/openvswitch/ovs |
#Vulnerabilities | 23 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2022-08-23 | CVE-2021-3905 | A memory leak was found in Open vSwitch (OVS) during userspace IP fragmentation processing. An attacker could use this flaw to potentially exhaust available memory by keeping sending packet fragments. | Ubuntu_linux, Fedora, Openvswitch, Enterprise_linux_fast_datapath | 7.5 | ||
2022-08-29 | CVE-2022-0669 | A flaw was found in dpdk. This flaw allows a malicious vhost-user master to attach an unexpected number of fds as ancillary data to VHOST_USER_GET_INFLIGHT_FD / VHOST_USER_SET_INFLIGHT_FD messages that are not closed by the vhost-user slave. By sending such messages continuously, the vhost-user master exhausts available fd in the vhost-user slave process, leading to a denial of service. | Data_plane_development_kit, Openvswitch, Openshift_container_platform | 6.5 | ||
2023-01-10 | CVE-2022-4337 | An out-of-bounds read in Organization Specific TLV was found in various versions of OpenvSwitch. | Debian_linux, Openvswitch | 9.8 | ||
2023-01-10 | CVE-2022-4338 | An integer underflow in Organization Specific TLV was found in various versions of OpenvSwitch. | Debian_linux, Openvswitch | 9.8 | ||
2023-10-06 | CVE-2023-5366 | A flaw was found in Open vSwitch that allows ICMPv6 Neighbor Advertisement packets between virtual machines to bypass OpenFlow rules. This issue may allow a local attacker to create specially crafted packets with a modified or spoofed target IP address field that can redirect ICMPv6 traffic to arbitrary IP addresses. | Openvswitch, Enterprise_linux, Fast_datapath, Openshift_container_platform, Virtualization | 5.5 | ||
2022-09-08 | CVE-2019-25076 | The TSS (Tuple Space Search) algorithm in Open vSwitch 2.x through 2.17.2 and 3.0.0 allows remote attackers to cause a denial of service (delays of legitimate traffic) via crafted packet data that requires excessive evaluation time within the packet classification algorithm for the MegaFlow cache, aka a Tuple Space Explosion (TSE) attack. | Openvswitch | 5.8 | ||
2017-05-23 | CVE-2017-9214 | In Open vSwitch (OvS) 2.7.0, while parsing an OFPT_QUEUE_GET_CONFIG_REPLY type OFP 1.0 message, there is a buffer over-read that is caused by an unsigned integer underflow in the function `ofputil_pull_queue_get_config_reply10` in `lib/ofp-util.c`. | Debian_linux, Openvswitch, Openstack, Virtualization, Virtualization_manager | 9.8 | ||
2018-09-19 | CVE-2018-17204 | An issue was discovered in Open vSwitch (OvS) 2.7.x through 2.7.6, affecting parse_group_prop_ntr_selection_method in lib/ofp-util.c. When decoding a group mod, it validates the group type and command after the whole group mod has been decoded. The OF1.5 decoder, however, tries to use the type and command earlier, when it might still be invalid. This causes an assertion failure (via OVS_NOT_REACHED). ovs-vswitchd does not enable support for OpenFlow 1.5 by default. | Ubuntu_linux, Debian_linux, Openvswitch, Openstack | 4.3 | ||
2018-09-19 | CVE-2018-17205 | An issue was discovered in Open vSwitch (OvS) 2.7.x through 2.7.6, affecting ofproto_rule_insert__ in ofproto/ofproto.c. During bundle commit, flows that are added in a bundle are applied to ofproto in order. If a flow cannot be added (e.g., the flow action is a go-to for a group id that does not exist), OvS tries to revert back all previous flows that were successfully applied from the same bundle. This is possible since OvS maintains list of old flows that were replaced by flows from the... | Ubuntu_linux, Openvswitch, Openstack | 7.5 | ||
2018-09-19 | CVE-2018-17206 | An issue was discovered in Open vSwitch (OvS) 2.7.x through 2.7.6. The decode_bundle function inside lib/ofp-actions.c is affected by a buffer over-read issue during BUNDLE action decoding. | Ubuntu_linux, Debian_linux, Openvswitch, Openstack | 4.9 |