Open vSwitch 2.7.4

CPE Details

Open vSwitch 2.7.4
2.7.4
2019-06-19
22h08 +00:00
2019-06-19
22h08 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:openvswitch:openvswitch:2.7.4:*:*:*:*:*:*:*

Informations

Vendor

openvswitch

Product

openvswitch

Version

2.7.4

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2023-5366 2023-10-06 17h43 +00:00 A flaw was found in Open vSwitch that allows ICMPv6 Neighbor Advertisement packets between virtual machines to bypass OpenFlow rules. This issue may allow a local attacker to create specially crafted packets with a modified or spoofed target IP address field that can redirect ICMPv6 traffic to arbitrary IP addresses.
7.1
Haute
CVE-2022-4337 2023-01-09 23h00 +00:00 An out-of-bounds read in Organization Specific TLV was found in various versions of OpenvSwitch.
9.8
Critique
CVE-2022-4338 2023-01-09 23h00 +00:00 An integer underflow in Organization Specific TLV was found in various versions of OpenvSwitch.
9.8
Critique
CVE-2019-25076 2022-09-08 20h08 +00:00 The TSS (Tuple Space Search) algorithm in Open vSwitch 2.x through 2.17.2 and 3.0.0 allows remote attackers to cause a denial of service (delays of legitimate traffic) via crafted packet data that requires excessive evaluation time within the packet classification algorithm for the MegaFlow cache, aka a Tuple Space Explosion (TSE) attack.
5.8
Moyen
CVE-2021-3905 2022-08-22 22h00 +00:00 A memory leak was found in Open vSwitch (OVS) during userspace IP fragmentation processing. An attacker could use this flaw to potentially exhaust available memory by keeping sending packet fragments.
7.5
Haute
CVE-2020-27827 2021-03-17 23h00 +00:00 A flaw was found in multiple versions of OpenvSwitch. Specially crafted LLDP packets can cause memory to be lost when allocating data to handle specific optional TLVs, potentially causing a denial of service. The highest threat from this vulnerability is to system availability.
7.5
Haute
CVE-2020-35498 2021-02-10 23h00 +00:00 A vulnerability was found in openvswitch. A limitation in the implementation of userspace packet parsing can allow a malicious user to send a specially crafted packet causing the resulting megaflow in the kernel to be too wide, potentially causing a denial of service. The highest threat from this vulnerability is to system availability.
7.5
Haute
CVE-2018-17204 2018-09-19 14h00 +00:00 An issue was discovered in Open vSwitch (OvS) 2.7.x through 2.7.6, affecting parse_group_prop_ntr_selection_method in lib/ofp-util.c. When decoding a group mod, it validates the group type and command after the whole group mod has been decoded. The OF1.5 decoder, however, tries to use the type and command earlier, when it might still be invalid. This causes an assertion failure (via OVS_NOT_REACHED). ovs-vswitchd does not enable support for OpenFlow 1.5 by default.
4.3
Moyen
CVE-2018-17205 2018-09-19 14h00 +00:00 An issue was discovered in Open vSwitch (OvS) 2.7.x through 2.7.6, affecting ofproto_rule_insert__ in ofproto/ofproto.c. During bundle commit, flows that are added in a bundle are applied to ofproto in order. If a flow cannot be added (e.g., the flow action is a go-to for a group id that does not exist), OvS tries to revert back all previous flows that were successfully applied from the same bundle. This is possible since OvS maintains list of old flows that were replaced by flows from the bundle. While reinserting old flows, OvS has an assertion failure due to a check on rule state != RULE_INITIALIZED. This would work for new flows, but for an old flow the rule state is RULE_REMOVED. The assertion failure causes an OvS crash.
7.5
Haute
CVE-2018-17206 2018-09-19 14h00 +00:00 An issue was discovered in Open vSwitch (OvS) 2.7.x through 2.7.6. The decode_bundle function inside lib/ofp-actions.c is affected by a buffer over-read issue during BUNDLE action decoding.
4.9
Moyen
CVE-2017-14970 2017-10-01 18h00 +00:00 In lib/ofp-util.c in Open vSwitch (OvS) before 2.8.1, there are multiple memory leaks while parsing malformed OpenFlow group mod messages. NOTE: the vendor disputes the relevance of this report, stating "it can only be triggered by an OpenFlow controller, but OpenFlow controllers have much more direct and powerful ways to force Open vSwitch to allocate memory, such as by inserting flows into the flow table."
5.9
Moyen