CVE-2017-14970
Published: 2 October 2017
In lib/ofp-util.c in Open vSwitch (OvS) before 2.8.1, there are multiple memory leaks while parsing malformed OpenFlow group mod messages. NOTE: the vendor disputes the relevance of this report, stating "it can only be triggered by an OpenFlow controller, but OpenFlow controllers have much more direct and powerful ways to force Open vSwitch to allocate memory, such as by inserting flows into the flow table."
Notes
Author | Note |
---|---|
mdeslaur | upstream is working to get this CVE rejected. https://mail.openvswitch.org/pipermail/ovs-dev/2017-October/339432.html marking as ignored |
Priority
Status
Package | Release | Status |
---|---|---|
openvswitch Launchpad, Ubuntu, Debian |
artful |
Ignored
(end of life)
|
bionic |
Not vulnerable
(2.9.0-0ubuntu1)
|
|
trusty |
Does not exist
(trusty was ignored)
|
|
upstream |
Released
(2.8.1)
|
|
xenial |
Ignored
|
|
zesty |
Ignored
(end of life)
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 5.9 |
Attack vector | Network |
Attack complexity | High |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H |