{"id":"CVE-2017-9214","details":"In Open vSwitch (OvS) 2.7.0, while parsing an OFPT_QUEUE_GET_CONFIG_REPLY type OFP 1.0 message, there is a buffer over-read that is caused by an unsigned integer underflow in the function `ofputil_pull_queue_get_config_reply10` in `lib/ofp-util.c`.","modified":"2026-04-02T00:20:12.472794Z","published":"2017-05-23T17:29:00.257Z","related":["SUSE-SU-2018:0311-1","SUSE-SU-2018:0505-1"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:2692"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2021/02/msg00032.html"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:2418"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:2648"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:2665"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:2698"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:2727"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:2553"},{"type":"FIX","url":"https://mail.openvswitch.org/pipermail/ovs-dev/2017-May/332711.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/openvswitch/ovs","events":[{"introduced":"0"},{"last_affected":"c298ef781c2d35d939fe163cbc2f41ea7b1cb8d1"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"2.7.0"}]}}],"versions":["v0.90.0","v0.90.1","v0.90.2","v0.90.3","v0.90.4","v0.90.5","v0.90.6","v0.90.7","v0.99.0","v0.99.1","v0.99.2","v1.0.0","v1.0.1","v1.0.2","v1.0.3","v1.1.0","v1.1.0pre1","v1.1.0pre2","v1.1.1","v1.1.2","v1.10.0","v1.10.2","v1.11.0","v1.11.1","v1.2.0","v1.2.1","v1.2.2","v1.3.0","v1.4.0","v1.4.1","v1.4.2","v1.4.3","v1.4.4","v1.4.5","v1.4.6","v1.5.0","v1.6.1","v1.7.0","v1.7.1","v1.7.2","v1.7.3","v1.9.0","v1.9.3","v2.0","v2.0.1","v2.0.2","v2.1.0","v2.1.1","v2.1.2","v2.1.3","v2.10.0","v2.10.1","v2.10.2","v2.10.3","v2.10.4","v2.10.5","v2.10.6","v2.10.7","v2.11.0","v2.11.1","v2.11.2","v2.11.3","v2.11.4","v2.11.5","v2.11.6","v2.11.7","v2.12.0","v2.12.1","v2.12.2","v2.12.3","v2.12.4","v2.13.0","v2.13.1","v2.13.10","v2.13.11","v2.13.2","v2.13.3","v2.13.4","v2.13.5","v2.13.6","v2.13.7","v2.13.8","v2.13.9","v2.14.0","v2.14.1","v2.14.2","v2.14.3","v2.14.4","v2.14.5","v2.14.6","v2.14.7","v2.14.8","v2.14.9","v2.15.0","v2.15.1","v2.15.2","v2.15.3","v2.15.4","v2.15.5","v2.15.6","v2.15.7","v2.15.8","v2.16.0","v2.16.1","v2.16.2","v2.16.3","v2.16.4","v2.16.5","v2.16.6","v2.16.7","v2.17.0","v2.17.1","v2.17.10","v2.17.11","v2.17.12","v2.17.2","v2.17.3","v2.17.4","v2.17.5","v2.17.6","v2.17.7","v2.17.8","v2.17.9","v2.3","v2.3.1","v2.3.2","v2.3.3","v2.4.0","v2.4.1","v2.5.0","v2.5.1","v2.5.10","v2.5.11","v2.5.12","v2.5.2","v2.5.3","v2.5.4","v2.5.5","v2.5.6","v2.5.7","v2.5.8","v2.5.9","v2.6.0","v2.6.1","v2.6.10","v2.6.2","v2.6.3","v2.6.4","v2.6.5","v2.6.6","v2.6.7","v2.6.8","v2.6.9","v2.7.0","v2.8.0","v2.8.1","v2.8.10","v2.8.11","v2.8.2","v2.8.3","v2.8.4","v2.8.5","v2.8.6","v2.8.7","v2.8.8","v2.8.9","v2.9.0","v2.9.1","v2.9.2","v2.9.3","v2.9.4","v2.9.5","v2.9.6","v2.9.7","v2.9.8","v2.9.9","v3.0.0","v3.0.1","v3.0.2","v3.0.3","v3.0.4","v3.0.5","v3.0.6","v3.0.7","v3.0.8","v3.1.0","v3.1.1","v3.1.2","v3.1.3","v3.1.4","v3.1.5","v3.1.6","v3.1.7","v3.2.0","v3.2.1","v3.2.2","v3.2.3","v3.2.4","v3.2.5","v3.2.6","v3.3.0","v3.3.1","v3.3.2","v3.3.3","v3.3.4","v3.3.5","v3.3.6","v3.3.7","v3.3.8","v3.3.9","v3.4.0","v3.4.1","v3.4.2","v3.4.3","v3.4.4","v3.4.5","v3.4.6","v3.5.0","v3.5.1","v3.5.2","v3.5.3","v3.5.4","v3.6.0","v3.6.1","v3.6.2","v3.6.3","v3.7.0","v3.7.1"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8"}]},{"events":[{"introduced":"0"},{"last_affected":"9"}]},{"events":[{"introduced":"0"},{"last_affected":"10"}]},{"events":[{"introduced":"0"},{"last_affected":"11"}]},{"events":[{"introduced":"0"},{"last_affected":"4.1"}]},{"events":[{"introduced":"0"},{"last_affected":"4.1"}]},{"events":[{"introduced":"0"},{"last_affected":"4.0"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-9214.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}