CVE Vulnerabilities

CVE-2017-9214

Integer Underflow (Wrap or Wraparound)

Published: May 23, 2017 | Modified: Apr 20, 2025
CVSS 3.x
9.8
CRITICAL
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
7.5 HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
7.5 MODERATE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

In Open vSwitch (OvS) 2.7.0, while parsing an OFPT_QUEUE_GET_CONFIG_REPLY type OFP 1.0 message, there is a buffer over-read that is caused by an unsigned integer underflow in the function ofputil_pull_queue_get_config_reply10 in lib/ofp-util.c.

Weakness

The product subtracts one value from another, such that the result is less than the minimum allowable integer value, which produces a value that is not equal to the correct result.

Affected Software

NameVendorStart VersionEnd Version
OpenvswitchOpenvswitch2.7.0 (including)2.7.0 (including)
Fast Datapath for Red Hat Enterprise Linux 7RedHatopenvswitch-0:2.7.2-1.git20170719.el7fdp*
Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7RedHatopenvswitch-0:2.4.1-2.git20160727.el7ost*
Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7RedHatopenvswitch-0:2.5.0-15.git20160727.el7ost*
Red Hat OpenStack Platform 10.0 (Newton)RedHatopenvswitch-0:2.6.1-13.git20161206.el7ost*
Red Hat OpenStack Platform 11.0 (Ocata)RedHatopenvswitch-0:2.6.1-13.git20161206.el7ost*
Red Hat OpenStack Platform 8.0 (Liberty)RedHatopenvswitch-0:2.5.0-15.git20160727.el7ost*
Red Hat OpenStack Platform 9.0 (Mitaka)RedHatopenvswitch-0:2.5.0-15.git20160727.el7ost*
Red Hat Virtualization 4.2 for Red Hat Enterprise Linux 7.6 EUSRedHatopenvswitch-0:2.7.2-1.git20170719.el7fdp*
OpenvswitchUbuntuesm-infra/xenial*
OpenvswitchUbuntuxenial*
OpenvswitchUbuntuyakkety*
OpenvswitchUbuntuzesty*

References