CVE-2017-9264

Priority
Description
In lib/conntrack.c in the firewall implementation in Open vSwitch (OvS)
2.6.1, there is a buffer over-read while parsing malformed TCP, UDP, and
IPv6 packets in the functions `extract_l3_ipv6`, `extract_l4_tcp`, and
`extract_l4_udp` that can be triggered remotely.
Assigned-to
mdeslaur
Notes
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was not-affected [code not present])
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (code not present)
Patches:
Upstream:https://github.com/openvswitch/ovs/commit/40225b0c04e2ae3e353cae12b8561ff237125b92
More Information

Updated: 2020-01-29 20:00:40 UTC (commit 768ceb2fdee6790d707d0f681e1b54916744af1e)