python-openvswitch vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the python-openvswitch package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Uncaught Exception

*
  • M
Insufficient Verification of Data Authenticity

*
  • M
Always-Incorrect Control Flow Implementation

*
  • M
Always-Incorrect Control Flow Implementation

*
  • H
Deserialization of Untrusted Data

<0:2.4.0-1.el7
  • H
Insufficient Verification of Data Authenticity

<0:2.4.0-1.el7
  • H
Cross-site Request Forgery (CSRF)

<0:2.4.0-1.el7
  • H
Cross-site Request Forgery (CSRF)

<0:2.4.0-1.el7
  • H
Cross-site Scripting (XSS)

<0:2.4.0-1.el7
  • H
Improper Access Control

<0:2.4.0-1.el7
  • H
Access Restriction Bypass

<0:2.4.0-1.el7
  • H
Access Restriction Bypass

<0:2.4.0-1.el7
  • H
Directory Traversal

<0:2.4.0-1.el7
  • H
Information Exposure

<0:2.4.0-1.el7
  • H
Information Exposure

<0:2.4.0-1.el7
  • H
CVE-2015-5319

<0:2.4.0-1.el7
  • H
Cross-site Request Forgery (CSRF)

<0:2.4.0-1.el7
  • H
Information Exposure

<0:2.4.0-1.el7
  • H
Improper Access Control

<0:2.4.0-1.el7
  • H
Cross-site Scripting (XSS)

<0:2.4.0-1.el7
  • H
Cross-site Scripting (XSS)

<0:2.4.0-1.el7
  • H
Improper Input Validation

<0:2.4.0-1.el7
  • H
Improper Input Validation

<0:2.4.0-1.el7
  • H
Link Following

<0:2.4.0-1.el7
  • H
Access Restriction Bypass

<0:2.4.0-1.el7
  • H
Cross-site Scripting (XSS)

<0:2.4.0-1.el7
  • H
Information Exposure

<0:2.4.0-1.el7
  • H
Improper Authorization

<0:2.4.0-1.el7
  • H
Arbitrary Code Injection

<0:2.4.0-1.el7
  • H
Directory Traversal

<0:2.4.0-1.el7
  • H
Incorrect Authorization

<0:2.4.0-1.el7
  • H
Information Exposure

<0:2.4.0-1.el7
  • H
Resource Exhaustion

<0:2.4.0-1.el7
  • H
Cross-site Scripting (XSS)

<0:2.4.0-1.el7
  • H
Null Byte Interaction Error (Poison Null Byte)

<0:2.4.0-1.el7
  • H
Stack-based Buffer Overflow

<0:2.4.0-2.el7_2
  • H
Stack-based Buffer Overflow

<0:2.4.0-2.el7_2
  • H
Improper Authorization

<0:2.4.0-1.el7
  • H
Improper Authorization

<0:2.4.0-1.el7
  • M
Heap-based Buffer Overflow

<0:2.5.0-15.git20160727.el7ost
  • M
Heap-based Buffer Overflow

<0:2.5.0-15.git20160727.el7ost
  • M
Heap-based Buffer Overflow

<0:2.6.1-13.git20161206.el7ost
  • M
Heap-based Buffer Overflow

<0:2.7.2-1.git20170719.el7fdp
  • M
Heap-based Buffer Overflow

<0:2.5.0-15.git20160727.el7ost
  • M
Heap-based Buffer Overflow

<0:2.7.2-1.git20170719.el7fdp
  • M
Heap-based Buffer Overflow

<0:2.6.1-13.git20161206.el7ost
  • M
Improper Input Validation

<0:2.5.0-15.git20160727.el7ost
  • M
Improper Input Validation

<0:2.5.0-15.git20160727.el7ost
  • M
Improper Input Validation

<0:2.7.2-1.git20170719.el7fdp
  • M
Improper Input Validation

<0:2.6.1-13.git20161206.el7ost
  • M
Improper Input Validation

<0:2.5.0-15.git20160727.el7ost
  • M
Integer Overflow or Wraparound

<0:2.7.2-1.git20170719.el7fdp
  • M
Integer Overflow or Wraparound

<0:2.5.0-15.git20160727.el7ost
  • M
Integer Overflow or Wraparound

<0:2.6.1-13.git20161206.el7ost
  • M
Integer Overflow or Wraparound

<0:2.5.0-15.git20160727.el7ost
  • M
Integer Overflow or Wraparound

<0:2.5.0-15.git20160727.el7ost
  • M
Integer Underflow

*
  • M
Integer Underflow

*
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • H
Buffer Over-read

*
  • M
Return of Wrong Status Code

*
  • M
Return of Wrong Status Code

*
  • M
Out-of-bounds Read

*
  • M
Memory Leak

*
  • M
Resource Exhaustion

*
  • H
Resource Exhaustion

<0:2.9.9-1.el7fdp
  • M
Improper Input Validation

*
  • M
Improper Input Validation

<0:2.9.0-83.el7fdp.1
  • M
Improper Input Validation

<0:2.9.0-83.el7fdp.1
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

<0:2.9.0-70.el7fdp.1
  • M
Out-of-bounds Read

<0:2.9.0-70.el7fdp.1
  • M
Out-of-bounds Read

<0:2.9.0-83.el7fdp.1
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Read

<0:2.9.0-83.el7fdp.1
  • M
Improper Input Validation

<0:2.9.0-83.el7fdp.1
  • M
Improper Input Validation

*
  • M
Improper Input Validation

<0:2.9.0-70.el7fdp.1
  • M
Improper Input Validation

<0:2.9.0-83.el7fdp.1
  • M
Out-of-bounds Read

*
  • M
Information Exposure

<0:2.9.0-19.el7fdp.1
  • M
Information Exposure

*
  • M
Information Exposure

<0:2.9.0-19.el7fdp.1
  • M
Information Exposure

<0:2.9.0-19.el7fdp
  • M
Information Exposure

<0:2.9.0-19.el7fdp
  • H
Buffer Overflow

<0:2.9.9-1.el7fdp
  • H
Buffer Overflow

<0:2.9.9-1.el7fdp
  • M
Use After Free

*
  • M
Integer Overflow or Wraparound

*
  • M
Integer Overflow or Wraparound

<0:2.9.0-130.el7fdp
  • M
Integer Overflow or Wraparound

<0:2.9.0-130.el7fdp
  • M
Integer Overflow or Wraparound

*
  • M
Resource Exhaustion

*
  • M
Memory Leak

<0:2.9.0-124.el7fdp
  • M
Memory Leak

*
  • M
Resource Exhaustion

*
  • H
Resource Exhaustion

<0:2.9.9-1.el7fdp