Critical severity9.8NVD Advisory· Published Jul 3, 2016· Updated May 6, 2026
CVE-2016-2074
CVE-2016-2074
Description
Buffer overflow in lib/flow.c in ovs-vswitchd in Open vSwitch 2.2.x and 2.3.x before 2.3.3 and 2.4.x before 2.4.1 allows remote attackers to execute arbitrary code via crafted MPLS packets, as demonstrated by a long string in an ovs-appctl command.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
12- openvswitch.org/pipermail/announce/2016-March/000083.htmlnvdPatch
- openvswitch.org/pipermail/announce/2016-March/000082.htmlnvdVendor Advisory
- rhn.redhat.com/errata/RHSA-2016-0523.htmlnvd
- rhn.redhat.com/errata/RHSA-2016-0524.htmlnvd
- rhn.redhat.com/errata/RHSA-2016-0537.htmlnvd
- www.debian.org/security/2016/dsa-3533nvd
- www.securityfocus.com/bid/85700nvd
- access.redhat.com/errata/RHSA-2016:0615nvd
- bugzilla.redhat.com/show_bug.cginvd
- security-tracker.debian.org/tracker/CVE-2016-2074nvd
- security.gentoo.org/glsa/201701-07nvd
- support.citrix.com/article/CTX232655nvd
News mentions
0No linked articles in our index yet.