ovs@2.6.0 vulnerabilities

Open vSwitch library

  • latest version

    3.4.1

  • latest non vulnerable version

  • first published

    9 years ago

  • latest version published

    1 months ago

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the ovs package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • C
    Denial of Service (DoS)

    ovs is Open vSwitch library.

    Affected versions of the package are vulnerable to Denial of Service (DoS). In lib/conntrack.c in the firewall implementation in Open vSwitch (OvS) 2.6.1, there is a buffer over-read while parsing malformed TCP, UDP, and IPv6 packets in the functions extract_l3_ipv6, extract_l4_tcp, and extract_l4_udp that can be triggered remotely.

    How to fix Denial of Service (DoS)?

    Upgrade ovs to version 2.7.2 or higher.

    [,2.7.2)
    • C
    Denial of Service (DoS)

    ovs is Open vSwitch library.

    Affected versions of the package are vulnerable to Denial of Service (DoS). In Open vSwitch (OvS) 2.7.0, while parsing an OFPT_QUEUE_GET_CONFIG_REPLY type OFP 1.0 message, there is a buffer over-read that is caused by an unsigned integer underflow in the function ofputil_pull_queue_get_config_reply10 in lib/ofp-util.c.

    How to fix Denial of Service (DoS)?

    Upgrade ovs to version 2.7.1 or higher.

    [,2.7.1)
    • C
    Denial of Service (DoS)

    ovs is Open vSwitch library.

    Affected versions of the package are vulnerable to Denial of Service (DoS). In Open vSwitch (OvS) v2.7.0, there is a buffer over-read while parsing the group mod OpenFlow message sent from the controller in lib/ofp-util.c in the function ofputil_pull_ofp15_group_mod.

    How to fix Denial of Service (DoS)?

    Upgrade ovs to version 2.7.2 or higher.

    [,2.7.2)