CVE-2017-9264

Priority
Medium
Description
In lib/conntrack.c in the firewall implementation in Open vSwitch (OvS)
2.6.1, there is a buffer over-read while parsing malformed TCP, UDP, and
IPv6 packets in the functions `extract_l3_ipv6`, `extract_l4_tcp`, and
`extract_l4_udp` that can be triggered remotely.
References
Bugs
Assigned-to
mdeslaur
Package
Upstream:needs-triage
Ubuntu 17.10 (Artful Aardvark):not-affected (2.8.0~git20170809.7aa47a19d-0ubuntu1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 LTS (Trusty Tahr):not-affected (code not present)
Ubuntu Core 15.04:DNE
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (code not present)
Ubuntu 17.04 (Zesty Zapus):released (2.6.1-0ubuntu5.1)
Patches:
Upstream:https://github.com/openvswitch/ovs/commit/40225b0c04e2ae3e353cae12b8561ff237125b92
More Information

Updated: 2017-10-11 14:14:46 UTC (commit 13496)