In lib/conntrack.c in the firewall implementation in Open vSwitch (OvS) 2.6.1, there is a buffer over-read while parsing malformed TCP, UDP, and IPv6 packets in the functions `extract_l3_ipv6`, `extract_l4_tcp`, and `extract_l4_udp` that can be triggered remotely.

Subscriptions

Vendors Products
Openvswitch Subscribe
Openvswitch Subscribe
Enterprise Linux Subscribe
Openstack Subscribe

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2017-18200 In lib/conntrack.c in the firewall implementation in Open vSwitch (OvS) 2.6.1, there is a buffer over-read while parsing malformed TCP, UDP, and IPv6 packets in the functions `extract_l3_ipv6`, `extract_l4_tcp`, and `extract_l4_udp` that can be triggered remotely.
Ubuntu USN Ubuntu USN USN-3450-1 Open vSwitch vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T17:02:44.204Z

Reserved: 2017-05-28T00:00:00.000Z

Link: CVE-2017-9264

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2017-05-29T04:29:00.400

Modified: 2025-04-20T01:37:25.860

Link: CVE-2017-9264

cve-icon Redhat

Severity : Moderate

Publid Date: 2017-03-03T00:00:00Z

Links: CVE-2017-9264 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses