CVE-2017-14970

NameCVE-2017-14970
DescriptionIn lib/ofp-util.c in Open vSwitch (OvS) before 2.8.1, there are multiple memory leaks while parsing malformed OpenFlow group mod messages. NOTE: the vendor disputes the relevance of this report, stating "it can only be triggered by an OpenFlow controller, but OpenFlow controllers have much more direct and powerful ways to force Open vSwitch to allocate memory, such as by inserting flows into the flow table."
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs877543

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
openvswitch (PTS)jessie, jessie (lts)2.3.0+git20140819-3+deb8u1vulnerable
stretch (security), stretch (lts), stretch2.6.10-0+deb9u1vulnerable
buster (security), buster, buster (lts)2.10.7+ds1-0+deb10u5fixed
bullseye (security), bullseye2.15.0+ds1-2+deb11u5fixed
bookworm (security), bookworm3.1.0-2+deb12u1fixed
sid, trixie3.4.0-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
openvswitchsourceexperimental2.8.1+dfsg1-1
openvswitchsource(unstable)2.8.1+dfsg1-2unimportant877543

Notes

https://mail.openvswitch.org/pipermail/ovs-dev/2017-September/339085.html
https://mail.openvswitch.org/pipermail/ovs-dev/2017-September/339086.html
Not considered a security issue by upstream, see #877543

Search for package or bug name: Reporting problems