In ovs versions v0.90.0 through v2.5.0 are vulnerable to heap buffer over-read in flow.c. An unsafe comparison of “minimasks” function could lead access to an unmapped region of memory. This vulnerability is capable of crashing the software, memory modification, and possible remote execution.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3168-1 | openvswitch security update |
EUVD |
EUVD-2022-53397 | In ovs versions v0.90.0 through v2.5.0 are vulnerable to heap buffer over-read in flow.c. An unsafe comparison of “minimasks” function could lead access to an unmapped region of memory. This vulnerability is capable of crashing the software, memory modification, and possible remote execution. |
Ubuntu USN |
USN-5698-1 | Open vSwitch vulnerability |
Ubuntu USN |
USN-5698-2 | Open vSwitch vulnerability |
Fixes
Solution
Update version to v2.5.1 or later
Workaround
No workaround given by the vendor.
References
History
Wed, 21 May 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
ssvc
|
Status: PUBLISHED
Assigner: Mend
Published:
Updated: 2025-05-21T14:13:43.702Z
Reserved: 2022-05-31T00:00:00.000Z
Link: CVE-2022-32166
Updated: 2024-08-03T07:32:55.987Z
Status : Modified
Published: 2022-09-28T10:15:09.560
Modified: 2025-05-21T15:15:56.693
Link: CVE-2022-32166
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN