CVE-2016-2074

Impact:
Important
Public Date:
2016-03-28
CWE:
CWE-121
Bugzilla:
1318553: CVE-2016-2074 openvswitch: MPLS buffer overflow vulnerability
A buffer overflow flaw was discovered in the OVS processing of MPLS labels. A remote attacker able to deliver a frame containing a malicious MPLS label that would be processed by OVS could trigger the flaw and use the resulting memory corruption to cause a denial of service (DoS) or, possibly, execute arbitrary code.

Find out more about CVE-2016-2074 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v2 metrics

Base Score 7.4
Base Metrics AV:A/AC:M/Au:S/C:C/I:C/A:C
Access Vector Adjacent Network
Access Complexity Medium
Authentication Single
Confidentiality Impact Complete
Integrity Impact Complete
Availability Impact Complete

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7 (openvswitch) RHSA-2016:0523 2016-03-30
Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7 (openvswitch) RHSA-2016:0524 2016-03-30
Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7 RHSA-2016:0537 2016-03-30
Red Hat OpenShift Enterprise 3.1 (openvswitch) RHSA-2016:0615 2016-04-11

Affected Packages State

Platform Package State
Red Hat OpenStack Platform 8.0 (Liberty) openvswitch-dpdk Not affected
Red Hat OpenStack Platform 8.0 (Liberty) openvswitch Not affected

Acknowledgements

Red Hat would like to thank the Open vSwitch project for reporting this issue. Upstream acknowledges Kashyap Thimmaraju and Bhargava Shastry as the original reporters.

Last Modified
Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.