MEDIUM · 6.1

CVE-2022-32166

In ovs versions v0.90.0 through v2.5.0 are vulnerable to heap buffer over-read in flow.c. An unsafe comparison of “minimasks” function could lead access to an unmapped region of memory. This vulnerabi...

Vulnerability Description

In ovs versions v0.90.0 through v2.5.0 are vulnerable to heap buffer over-read in flow.c. An unsafe comparison of “minimasks” function could lead access to an unmapped region of memory. This vulnerability is capable of crashing the software, memory modification, and possible remote execution.

CVSS Score

6.1

MEDIUM

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
LOW
Integrity
NONE
Availability
HIGH

Affected Products

VendorProductVersions
CloudbaseOpen Vswitch>= 0.90.0, <= 2.5.0
DebianDebian Linux10.0

Related Weaknesses (CWE)

References

FAQ

What is CVE-2022-32166?

CVE-2022-32166 is a vulnerability with a CVSS score of 6.1 (MEDIUM). In ovs versions v0.90.0 through v2.5.0 are vulnerable to heap buffer over-read in flow.c. An unsafe comparison of “minimasks” function could lead access to an unmapped region of memory. This vulnerabi...

How severe is CVE-2022-32166?

CVE-2022-32166 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2022-32166?

Check the references section above for vendor advisories and patch information. Affected products include: Cloudbase Open Vswitch, Debian Debian Linux.