Name | CVE-2022-32166 |
Description | In ovs versions v0.90.0 through v2.5.0 are vulnerable to heap buffer over-read in flow.c. An unsafe comparison of “minimasks” function could lead access to an unmapped region of memory. This vulnerability is capable of crashing the software, memory modification, and possible remote execution. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-3168-1 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
openvswitch (PTS) | jessie, jessie (lts) | 2.3.0+git20140819-3+deb8u1 | vulnerable |
stretch (security), stretch (lts), stretch | 2.6.10-0+deb9u1 | vulnerable | |
buster (security), buster, buster (lts) | 2.10.7+ds1-0+deb10u5 | fixed | |
bullseye (security), bullseye | 2.15.0+ds1-2+deb11u5 | fixed | |
bookworm (security), bookworm | 3.1.0-2+deb12u1 | fixed | |
sid, trixie | 3.4.0-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
openvswitch | source | jessie | (unfixed) | end-of-life | ||
openvswitch | source | stretch | (unfixed) | end-of-life | ||
openvswitch | source | buster | 2.10.7+ds1-0+deb10u2 | DLA-3168-1 | ||
openvswitch | source | (unstable) | 2.13.0+dfsg1-1 |
https://github.com/openvswitch/ovs/commit/2ed6505555cdcb46f9b1f0329d1491b75290fc73 (v2.12.0)