Vulnerabilities (CVE)

Filtered by vendor Openvswitch Subscribe
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-4338 2 Debian, Openvswitch 2 Debian Linux, Openvswitch 2023-11-26 N/A 9.8 CRITICAL
An integer underflow in Organization Specific TLV was found in various versions of OpenvSwitch.
CVE-2022-4337 2 Debian, Openvswitch 2 Debian Linux, Openvswitch 2023-11-26 N/A 9.8 CRITICAL
An out-of-bounds read in Organization Specific TLV was found in various versions of OpenvSwitch.
CVE-2017-9214 3 Debian, Openvswitch, Redhat 6 Debian Linux, Openvswitch, Enterprise Linux and 3 more 2021-08-04 7.5 HIGH 9.8 CRITICAL
In Open vSwitch (OvS) 2.7.0, while parsing an OFPT_QUEUE_GET_CONFIG_REPLY type OFP 1.0 message, there is a buffer over-read that is caused by an unsigned integer underflow in the function `ofputil_pull_queue_get_config_reply10` in `lib/ofp-util.c`.
CVE-2017-9264 1 Openvswitch 1 Openvswitch 2019-10-03 7.5 HIGH 9.8 CRITICAL
In lib/conntrack.c in the firewall implementation in Open vSwitch (OvS) 2.6.1, there is a buffer over-read while parsing malformed TCP, UDP, and IPv6 packets in the functions `extract_l3_ipv6`, `extract_l4_tcp`, and `extract_l4_udp` that can be triggered remotely.
CVE-2017-9265 1 Openvswitch 1 Openvswitch 2019-10-03 7.5 HIGH 9.8 CRITICAL
In Open vSwitch (OvS) v2.7.0, there is a buffer over-read while parsing the group mod OpenFlow message sent from the controller in `lib/ofp-util.c` in the function `ofputil_pull_ofp15_group_mod`.
CVE-2016-2074 2 Openvswitch, Redhat 2 Openvswitch, Openshift 2018-03-23 7.5 HIGH 9.8 CRITICAL
Buffer overflow in lib/flow.c in ovs-vswitchd in Open vSwitch 2.2.x and 2.3.x before 2.3.3 and 2.4.x before 2.4.1 allows remote attackers to execute arbitrary code via crafted MPLS packets, as demonstrated by a long string in an ovs-appctl command.