Safety vulnerability ID: 66669
The information on this page was manually curated by our Cybersecurity Intelligence Team.
In Open vSwitch (OvS) 2.7.0, while parsing an OFPT_QUEUE_GET_CONFIG_REPLY type OFP 1.0 message, there is a buffer over-read that is caused by an unsigned integer underflow in the function `ofputil_pull_queue_get_config_reply10` in `lib/ofp-util.c`.
Latest version: 3.5.0
Open vSwitch library
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application