3.6.0
10 years ago
2 months ago
Known vulnerabilities in the ovs package. This does not include vulnerabilities belonging to this package’s dependencies.
Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.
Fix for free| Vulnerability | Vulnerable Version |
|---|---|
Affected versions of the package are vulnerable to Denial of Service (DoS).
In lib/conntrack.c in the firewall implementation in Open vSwitch (OvS) 2.6.1, there is a buffer over-read while parsing malformed TCP, UDP, and IPv6 packets in the functions How to fix Denial of Service (DoS)? Upgrade | [,2.7.2) |
Affected versions of the package are vulnerable to Denial of Service (DoS).
In Open vSwitch (OvS) 2.7.0, while parsing an OFPT_QUEUE_GET_CONFIG_REPLY type OFP 1.0 message, there is a buffer over-read that is caused by an unsigned integer underflow in the function How to fix Denial of Service (DoS)? Upgrade | [,2.7.1) |
Affected versions of the package are vulnerable to Denial of Service (DoS).
In Open vSwitch (OvS) v2.7.0, there is a buffer over-read while parsing the group mod OpenFlow message sent from the controller in How to fix Denial of Service (DoS)? Upgrade | [,2.7.2) |