Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2018-17204
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T10:47:03.764Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2019:0053", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:0053" }, { "name": "USN-3873-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3873-1/" }, { "name": "RHSA-2018:3500", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:3500" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/openvswitch/ovs/commit/4af6da3b275b764b1afe194df6499b33d2bf4cde" }, { "name": "RHSA-2019:0081", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:0081" }, { "name": "[debian-lts-announce] 20210219 [SECURITY] [DLA 2571-1] openvswitch security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00032.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-09-19T00:00:00", "descriptions": [ { "lang": "en", "value": "An issue was discovered in Open vSwitch (OvS) 2.7.x through 2.7.6, affecting parse_group_prop_ntr_selection_method in lib/ofp-util.c. When decoding a group mod, it validates the group type and command after the whole group mod has been decoded. The OF1.5 decoder, however, tries to use the type and command earlier, when it might still be invalid. This causes an assertion failure (via OVS_NOT_REACHED). ovs-vswitchd does not enable support for OpenFlow 1.5 by default." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-02-20T00:06:13", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "RHSA-2019:0053", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:0053" }, { "name": "USN-3873-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3873-1/" }, { "name": "RHSA-2018:3500", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:3500" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/openvswitch/ovs/commit/4af6da3b275b764b1afe194df6499b33d2bf4cde" }, { "name": "RHSA-2019:0081", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:0081" }, { "name": "[debian-lts-announce] 20210219 [SECURITY] [DLA 2571-1] openvswitch security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00032.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-17204", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Open vSwitch (OvS) 2.7.x through 2.7.6, affecting parse_group_prop_ntr_selection_method in lib/ofp-util.c. When decoding a group mod, it validates the group type and command after the whole group mod has been decoded. The OF1.5 decoder, however, tries to use the type and command earlier, when it might still be invalid. This causes an assertion failure (via OVS_NOT_REACHED). ovs-vswitchd does not enable support for OpenFlow 1.5 by default." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2019:0053", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:0053" }, { "name": "USN-3873-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3873-1/" }, { "name": "RHSA-2018:3500", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:3500" }, { "name": "https://github.com/openvswitch/ovs/commit/4af6da3b275b764b1afe194df6499b33d2bf4cde", "refsource": "MISC", "url": "https://github.com/openvswitch/ovs/commit/4af6da3b275b764b1afe194df6499b33d2bf4cde" }, { "name": "RHSA-2019:0081", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:0081" }, { "name": "[debian-lts-announce] 20210219 [SECURITY] [DLA 2571-1] openvswitch security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00032.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-17204", "datePublished": "2018-09-19T16:00:00", "dateReserved": "2018-09-19T00:00:00", "dateUpdated": "2024-08-05T10:47:03.764Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2018-17204\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2018-09-19T16:29:00.897\",\"lastModified\":\"2024-11-21T03:54:05.327\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An issue was discovered in Open vSwitch (OvS) 2.7.x through 2.7.6, affecting parse_group_prop_ntr_selection_method in lib/ofp-util.c. When decoding a group mod, it validates the group type and command after the whole group mod has been decoded. The OF1.5 decoder, however, tries to use the type and command earlier, when it might still be invalid. This causes an assertion failure (via OVS_NOT_REACHED). ovs-vswitchd does not enable support for OpenFlow 1.5 by default.\"},{\"lang\":\"es\",\"value\":\"Se ha descubierto un problema en Open vSwitch (OvS) en versiones 2.7.x hasta la 2.7.6 que afecta a parse_group_prop_ntr_selection_method en lib/ofp-util.c. Cuando se descodifica un mod de grupo, valida el tipo de grupo y comando despu\u00e9s de que todo el mod de grupo se haya descodificado. Sin embargo, el decodificador OF1.5 intenta utilizar el tipo y comando antes, cuando puede ser todav\u00eda no v\u00e1lido. Esto provoca un fallo de aserci\u00f3n (mediante OVS_NOT_REACHED). ovs-vswitchd tiene deshabilitado el soporte para OpenFlow 1.5 por defecto.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L\",\"baseScore\":4.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":2.8,\"impactScore\":1.4}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:N/I:N/A:P\",\"baseScore\":4.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-617\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openvswitch:openvswitch:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.7.0\",\"versionEndIncluding\":\"2.7.6\",\"matchCriteriaId\":\"682FD155-6A56-43D5-9953-852BB3AA0109\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E722FEF7-58A6-47AD-B1D0-DB0B71B0C7AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openstack:13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"704CFA1A-953E-4105-BFBE-406034B83DED\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]}],\"references\":[{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3500\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:0053\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:0081\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/openvswitch/ovs/commit/4af6da3b275b764b1afe194df6499b33d2bf4cde\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/02/msg00032.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3873-1/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3500\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:0053\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:0081\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/openvswitch/ovs/commit/4af6da3b275b764b1afe194df6499b33d2bf4cde\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/02/msg00032.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3873-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
rhsa-2019_0053
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for openvswitch is now available for Red Hat OpenStack Platform 10.0 (Newton).\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Open vSwitch provides standard network bridging functions and support for the OpenFlow protocol for remote per-flow control of traffic.\n\nSecurity Fix(es):\n\n* openvswitch: Mishandle of group mods in lib/ofp-util.c:parse_group_prop_ntr_selection_method() allows for assertion failure (CVE-2018-17204)\n\n* openvswitch: Error during bundle commit in ofproto/ofproto.c:ofproto_rule_insert__() allows for crash (CVE-2018-17205)\n\n* openvswitch: Buffer over-read in lib/ofp-actions.c:decode_bundle() (CVE-2018-17206)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:0053", "url": "https://access.redhat.com/errata/RHSA-2019:0053" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1632522", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1632522" }, { "category": "external", "summary": "1632525", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1632525" }, { "category": "external", "summary": "1632528", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1632528" }, { "category": "external", "summary": "1644383", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1644383" }, { "category": "external", "summary": "1651454", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1651454" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_0053.json" } ], "title": "Red Hat Security Advisory: openvswitch security and bug fix update", "tracking": { "current_release_date": "2024-11-15T00:39:32+00:00", "generator": { "date": "2024-11-15T00:39:32+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2019:0053", "initial_release_date": "2019-01-16T17:12:31+00:00", "revision_history": [ { "date": "2019-01-16T17:12:31+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-01-16T17:12:31+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T00:39:32+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "OpenStack 10.0 Tools for RHEL 7", "product": { "name": "OpenStack 10.0 Tools for RHEL 7", "product_id": "7Server-RH7-RHOS-DEVTOOLS-10.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:10::el7" } } }, { "category": "product_name", "name": "Red Hat OpenStack Platform 10.0", "product": { "name": "Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:10::el7" } } } ], "category": "product_family", "name": "Red Hat OpenStack Platform" }, { "branches": [ { "category": "product_version", "name": "openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "product": { "name": "openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "product_id": "openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch-ovn-vtep@2.9.0-83.el7fdp.1?arch=x86_64" } } }, { "category": "product_version", "name": "openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "product": { "name": "openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "product_id": "openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch-debuginfo@2.9.0-83.el7fdp.1?arch=x86_64" } } }, { "category": "product_version", "name": "python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "product": { "name": "python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "product_id": "python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-openvswitch@2.9.0-83.el7fdp.1?arch=x86_64" } } }, { "category": "product_version", "name": "openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "product": { "name": "openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "product_id": "openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch-ovn-common@2.9.0-83.el7fdp.1?arch=x86_64" } } }, { "category": "product_version", "name": "openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "product": { "name": "openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "product_id": "openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch-ovn-central@2.9.0-83.el7fdp.1?arch=x86_64" } } }, { "category": "product_version", "name": "openvswitch-devel-0:2.9.0-83.el7fdp.1.x86_64", "product": { "name": "openvswitch-devel-0:2.9.0-83.el7fdp.1.x86_64", "product_id": "openvswitch-devel-0:2.9.0-83.el7fdp.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch-devel@2.9.0-83.el7fdp.1?arch=x86_64" } } }, { "category": "product_version", "name": "openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "product": { "name": "openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "product_id": "openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch@2.9.0-83.el7fdp.1?arch=x86_64" } } }, { "category": "product_version", "name": "openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "product": { "name": "openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "product_id": "openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch-ovn-host@2.9.0-83.el7fdp.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openvswitch-0:2.9.0-83.el7fdp.1.src", "product": { "name": "openvswitch-0:2.9.0-83.el7fdp.1.src", "product_id": "openvswitch-0:2.9.0-83.el7fdp.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch@2.9.0-83.el7fdp.1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "product": { "name": "openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "product_id": "openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch-test@2.9.0-83.el7fdp.1?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openvswitch-0:2.9.0-83.el7fdp.1.src as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.src" }, "product_reference": "openvswitch-0:2.9.0-83.el7fdp.1.src", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-0:2.9.0-83.el7fdp.1.x86_64 as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64" }, "product_reference": "openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64 as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64" }, "product_reference": "openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-devel-0:2.9.0-83.el7fdp.1.x86_64 as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:openvswitch-devel-0:2.9.0-83.el7fdp.1.x86_64" }, "product_reference": "openvswitch-devel-0:2.9.0-83.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64 as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64" }, "product_reference": "openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64 as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64" }, "product_reference": "openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64 as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64" }, "product_reference": "openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64 as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64" }, "product_reference": "openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-test-0:2.9.0-83.el7fdp.1.noarch as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch" }, "product_reference": "openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64 as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64" }, "product_reference": "python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-0:2.9.0-83.el7fdp.1.src as a component of OpenStack 10.0 Tools for RHEL 7", "product_id": "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.src" }, "product_reference": "openvswitch-0:2.9.0-83.el7fdp.1.src", "relates_to_product_reference": "7Server-RH7-RHOS-DEVTOOLS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-0:2.9.0-83.el7fdp.1.x86_64 as a component of OpenStack 10.0 Tools for RHEL 7", "product_id": "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64" }, "product_reference": "openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-DEVTOOLS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64 as a component of OpenStack 10.0 Tools for RHEL 7", "product_id": "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64" }, "product_reference": "openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-DEVTOOLS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-devel-0:2.9.0-83.el7fdp.1.x86_64 as a component of OpenStack 10.0 Tools for RHEL 7", "product_id": "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-devel-0:2.9.0-83.el7fdp.1.x86_64" }, "product_reference": "openvswitch-devel-0:2.9.0-83.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-DEVTOOLS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64 as a component of OpenStack 10.0 Tools for RHEL 7", "product_id": "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64" }, "product_reference": "openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-DEVTOOLS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64 as a component of OpenStack 10.0 Tools for RHEL 7", "product_id": "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64" }, "product_reference": "openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-DEVTOOLS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64 as a component of OpenStack 10.0 Tools for RHEL 7", "product_id": "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64" }, "product_reference": "openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-DEVTOOLS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64 as a component of OpenStack 10.0 Tools for RHEL 7", "product_id": "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64" }, "product_reference": "openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-DEVTOOLS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-test-0:2.9.0-83.el7fdp.1.noarch as a component of OpenStack 10.0 Tools for RHEL 7", "product_id": "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch" }, "product_reference": "openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-DEVTOOLS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64 as a component of OpenStack 10.0 Tools for RHEL 7", "product_id": "7Server-RH7-RHOS-DEVTOOLS-10.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64" }, "product_reference": "python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-DEVTOOLS-10.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-17204", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2018-09-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1632522" } ], "notes": [ { "category": "description", "text": "An issue was discovered in Open vSwitch (OvS), 2.4.x through 2.4.1, 2.5.x through 2.5.5, 2.6.x through 2.6.3, 2.7.x through 2.7.6, 2.8.x through 2.8.4, and2.9.x through 2.9.2, affecting the parse_group_prop_ntr_selection_method in lib/ofp-util.c. On controllers with the OpenFlow 1.5 decoder enabled, a specially crafted group update can cause an assertion failure, potentially leading to a Denial of Service condition.", "title": "Vulnerability description" }, { "category": "summary", "text": "openvswitch: Mishandle of group mods in lib/ofp-util.c:parse_group_prop_ntr_selection_method() allows for assertion failure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.src", "7Server-RH7-RHOS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-devel-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "7Server-RH7-RHOS-10.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.src", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-devel-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "7Server-RH7-RHOS-DEVTOOLS-10.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-17204" }, { "category": "external", "summary": "RHBZ#1632522", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1632522" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-17204", "url": "https://www.cve.org/CVERecord?id=CVE-2018-17204" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-17204", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-17204" } ], "release_date": "2018-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-01-16T17:12:31+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.src", "7Server-RH7-RHOS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-devel-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "7Server-RH7-RHOS-10.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.src", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-devel-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "7Server-RH7-RHOS-DEVTOOLS-10.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:0053" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 2.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "7Server-RH7-RHOS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.src", "7Server-RH7-RHOS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-devel-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "7Server-RH7-RHOS-10.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.src", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-devel-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "7Server-RH7-RHOS-DEVTOOLS-10.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openvswitch: Mishandle of group mods in lib/ofp-util.c:parse_group_prop_ntr_selection_method() allows for assertion failure" }, { "cve": "CVE-2018-17205", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2018-09-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1632525" } ], "notes": [ { "category": "description", "text": "An issue was discovered in Open vSwitch (OvS), 2.7.x through 2.7.6, 2.8.x through 2.8.4, and 2.9.x through 2.9.2, where the ofproto_rule_insert__() function inside ofproto/ofproto.c is affected by an assertion failure under certain circumstances.\r\nA specially crafted flow update applied using the bundling feature of Open vSwitch could potentially cause the assertion failure, potentially leading to incorrect flow information being applied, or a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "openvswitch: Error during bundle commit in ofproto/ofproto.c:ofproto_rule_insert__() allows for crash", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.src", "7Server-RH7-RHOS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-devel-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "7Server-RH7-RHOS-10.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.src", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-devel-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "7Server-RH7-RHOS-DEVTOOLS-10.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-17205" }, { "category": "external", "summary": "RHBZ#1632525", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1632525" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-17205", "url": "https://www.cve.org/CVERecord?id=CVE-2018-17205" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-17205", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-17205" } ], "release_date": "2018-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-01-16T17:12:31+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.src", "7Server-RH7-RHOS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-devel-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "7Server-RH7-RHOS-10.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.src", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-devel-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "7Server-RH7-RHOS-DEVTOOLS-10.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:0053" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.src", "7Server-RH7-RHOS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-devel-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "7Server-RH7-RHOS-10.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.src", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-devel-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "7Server-RH7-RHOS-DEVTOOLS-10.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openvswitch: Error during bundle commit in ofproto/ofproto.c:ofproto_rule_insert__() allows for crash" }, { "cve": "CVE-2018-17206", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2018-09-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1632528" } ], "notes": [ { "category": "description", "text": "An issue was discovered in Open vSwitch (OvS) 2.5.x through 2.5.5, 2.6.x through 2.6.3, 2.7.x through 2.7.6, 2.8.x through 2.8.4, and 2.9.x through 2.9.2 where the decode_bundle function inside lib/ofp-actions.c is affected by a buffer over-read issue during BUNDLE action decoding.\r\nA specially crafted flow update applied using the bundling feature of Open vSwitch could potentially cause a crash leading to a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "openvswitch: Buffer over-read in lib/ofp-actions.c:decode_bundle()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.src", "7Server-RH7-RHOS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-devel-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "7Server-RH7-RHOS-10.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.src", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-devel-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "7Server-RH7-RHOS-DEVTOOLS-10.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-17206" }, { "category": "external", "summary": "RHBZ#1632528", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1632528" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-17206", "url": "https://www.cve.org/CVERecord?id=CVE-2018-17206" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-17206", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-17206" } ], "release_date": "2018-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-01-16T17:12:31+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.src", "7Server-RH7-RHOS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-devel-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "7Server-RH7-RHOS-10.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.src", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-devel-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "7Server-RH7-RHOS-DEVTOOLS-10.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:0053" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.src", "7Server-RH7-RHOS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-devel-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "7Server-RH7-RHOS-10.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.src", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-devel-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "7Server-RH7-RHOS-DEVTOOLS-10.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openvswitch: Buffer over-read in lib/ofp-actions.c:decode_bundle()" } ] }
rhsa-2019_0081
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for openvswitch is now available for Red Hat OpenStack Platform 13.0 (Queens).\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Open vSwitch provides standard network bridging functions and support for the OpenFlow protocol for remote per-flow control of traffic.\n\nSecurity Fix(es):\n\n* openvswitch: Mishandle of group mods in lib/ofp-util.c:parse_group_prop_ntr_selection_method() allows for assertion failure (CVE-2018-17204)\n\n* openvswitch: Error during bundle commit in ofproto/ofproto.c:ofproto_rule_insert__() allows for crash (CVE-2018-17205)\n\n* openvswitch: Buffer over-read in lib/ofp-actions.c:decode_bundle() (CVE-2018-17206)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Previously, the first packet of a new connection using an OVN logical router was used to discover the MAC address of the destination. This resulted in the loss of the first packet on the new connection. This \nenhancement adds the capability to correctly queue the first packet of a new connection, which prevents the loss of that packet. (BZ#1600115)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:0081", "url": "https://access.redhat.com/errata/RHSA-2019:0081" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1600115", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1600115" }, { "category": "external", "summary": "1632522", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1632522" }, { "category": "external", "summary": "1632525", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1632525" }, { "category": "external", "summary": "1632528", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1632528" }, { "category": "external", "summary": "1651453", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1651453" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_0081.json" } ], "title": "Red Hat Security Advisory: openvswitch security and bug fix update", "tracking": { "current_release_date": "2024-11-15T00:39:37+00:00", "generator": { "date": "2024-11-15T00:39:37+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2019:0081", "initial_release_date": "2019-01-16T17:53:06+00:00", "revision_history": [ { "date": "2019-01-16T17:53:06+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-01-16T17:53:06+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T00:39:37+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenStack Platform 13.0", "product": { "name": "Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-13.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:13::el7" } } }, { "category": "product_name", "name": "Red Hat OpenStack Platform 13.0", "product": { "name": "Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-DEVTOOLS-13.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:13::el7" } } } ], "category": "product_family", "name": "Red Hat OpenStack Platform" }, { "branches": [ { "category": "product_version", "name": "openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "product": { "name": "openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "product_id": "openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch-test@2.9.0-83.el7fdp.1?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "product": { "name": "openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "product_id": "openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch-ovn-vtep@2.9.0-83.el7fdp.1?arch=x86_64" } } }, { "category": "product_version", "name": "openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "product": { "name": "openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "product_id": "openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch-debuginfo@2.9.0-83.el7fdp.1?arch=x86_64" } } }, { "category": "product_version", "name": "python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "product": { "name": "python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "product_id": "python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-openvswitch@2.9.0-83.el7fdp.1?arch=x86_64" } } }, { "category": "product_version", "name": "openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "product": { "name": "openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "product_id": "openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch-ovn-common@2.9.0-83.el7fdp.1?arch=x86_64" } } }, { "category": "product_version", "name": "openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "product": { "name": "openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "product_id": "openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch-ovn-central@2.9.0-83.el7fdp.1?arch=x86_64" } } }, { "category": "product_version", "name": "openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "product": { "name": "openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "product_id": "openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch@2.9.0-83.el7fdp.1?arch=x86_64" } } }, { "category": "product_version", "name": "openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "product": { "name": "openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "product_id": "openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch-ovn-host@2.9.0-83.el7fdp.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.ppc64le", "product": { "name": "openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.ppc64le", "product_id": "openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch-ovn-vtep@2.9.0-83.el7fdp.1?arch=ppc64le" } } }, { "category": "product_version", "name": "openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.ppc64le", "product": { "name": "openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.ppc64le", "product_id": "openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch-debuginfo@2.9.0-83.el7fdp.1?arch=ppc64le" } } }, { "category": "product_version", "name": "python-openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "product": { "name": "python-openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "product_id": "python-openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-openvswitch@2.9.0-83.el7fdp.1?arch=ppc64le" } } }, { "category": "product_version", "name": "openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.ppc64le", "product": { "name": "openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.ppc64le", "product_id": "openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch-ovn-common@2.9.0-83.el7fdp.1?arch=ppc64le" } } }, { "category": "product_version", "name": "openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.ppc64le", "product": { "name": "openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.ppc64le", "product_id": "openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch-ovn-central@2.9.0-83.el7fdp.1?arch=ppc64le" } } }, { "category": "product_version", "name": "openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "product": { "name": "openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "product_id": "openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch@2.9.0-83.el7fdp.1?arch=ppc64le" } } }, { "category": "product_version", "name": "openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.ppc64le", "product": { "name": "openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.ppc64le", "product_id": "openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch-ovn-host@2.9.0-83.el7fdp.1?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "openvswitch-0:2.9.0-83.el7fdp.1.src", "product": { "name": "openvswitch-0:2.9.0-83.el7fdp.1.src", "product_id": "openvswitch-0:2.9.0-83.el7fdp.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch@2.9.0-83.el7fdp.1?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openvswitch-0:2.9.0-83.el7fdp.1.ppc64le as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.ppc64le" }, "product_reference": "openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-0:2.9.0-83.el7fdp.1.src as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.src" }, "product_reference": "openvswitch-0:2.9.0-83.el7fdp.1.src", "relates_to_product_reference": "7Server-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-0:2.9.0-83.el7fdp.1.x86_64 as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64" }, "product_reference": "openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.ppc64le as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.ppc64le" }, "product_reference": "openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64 as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64" }, "product_reference": "openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.ppc64le as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.ppc64le" }, "product_reference": "openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64 as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64" }, "product_reference": "openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.ppc64le as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.ppc64le" }, "product_reference": "openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64 as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64" }, "product_reference": "openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.ppc64le as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.ppc64le" }, "product_reference": "openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64 as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64" }, "product_reference": "openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.ppc64le as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.ppc64le" }, "product_reference": "openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64 as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64" }, "product_reference": "openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-test-0:2.9.0-83.el7fdp.1.noarch as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-13.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch" }, "product_reference": "openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "python-openvswitch-0:2.9.0-83.el7fdp.1.ppc64le as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.ppc64le" }, "product_reference": "python-openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64 as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64" }, "product_reference": "python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-0:2.9.0-83.el7fdp.1.ppc64le as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.ppc64le" }, "product_reference": "openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOS-DEVTOOLS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-0:2.9.0-83.el7fdp.1.src as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.src" }, "product_reference": "openvswitch-0:2.9.0-83.el7fdp.1.src", "relates_to_product_reference": "7Server-RH7-RHOS-DEVTOOLS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-0:2.9.0-83.el7fdp.1.x86_64 as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64" }, "product_reference": "openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-DEVTOOLS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.ppc64le as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.ppc64le" }, "product_reference": "openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOS-DEVTOOLS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64 as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64" }, "product_reference": "openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-DEVTOOLS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.ppc64le as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.ppc64le" }, "product_reference": "openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOS-DEVTOOLS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64 as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64" }, "product_reference": "openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-DEVTOOLS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.ppc64le as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.ppc64le" }, "product_reference": "openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOS-DEVTOOLS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64 as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64" }, "product_reference": "openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-DEVTOOLS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.ppc64le as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.ppc64le" }, "product_reference": "openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOS-DEVTOOLS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64 as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64" }, "product_reference": "openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-DEVTOOLS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.ppc64le as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.ppc64le" }, "product_reference": "openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOS-DEVTOOLS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64 as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64" }, "product_reference": "openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-DEVTOOLS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-test-0:2.9.0-83.el7fdp.1.noarch as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch" }, "product_reference": "openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-DEVTOOLS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "python-openvswitch-0:2.9.0-83.el7fdp.1.ppc64le as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-DEVTOOLS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.ppc64le" }, "product_reference": "python-openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOS-DEVTOOLS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64 as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-DEVTOOLS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64" }, "product_reference": "python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-DEVTOOLS-13.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-17204", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2018-09-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1632522" } ], "notes": [ { "category": "description", "text": "An issue was discovered in Open vSwitch (OvS), 2.4.x through 2.4.1, 2.5.x through 2.5.5, 2.6.x through 2.6.3, 2.7.x through 2.7.6, 2.8.x through 2.8.4, and2.9.x through 2.9.2, affecting the parse_group_prop_ntr_selection_method in lib/ofp-util.c. On controllers with the OpenFlow 1.5 decoder enabled, a specially crafted group update can cause an assertion failure, potentially leading to a Denial of Service condition.", "title": "Vulnerability description" }, { "category": "summary", "text": "openvswitch: Mishandle of group mods in lib/ofp-util.c:parse_group_prop_ntr_selection_method() allows for assertion failure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.src", "7Server-RH7-RHOS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "7Server-RH7-RHOS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.src", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "7Server-RH7-RHOS-DEVTOOLS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-17204" }, { "category": "external", "summary": "RHBZ#1632522", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1632522" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-17204", "url": "https://www.cve.org/CVERecord?id=CVE-2018-17204" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-17204", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-17204" } ], "release_date": "2018-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-01-16T17:53:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.src", "7Server-RH7-RHOS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "7Server-RH7-RHOS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.src", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "7Server-RH7-RHOS-DEVTOOLS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:0081" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 2.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "7Server-RH7-RHOS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.src", "7Server-RH7-RHOS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "7Server-RH7-RHOS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.src", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "7Server-RH7-RHOS-DEVTOOLS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openvswitch: Mishandle of group mods in lib/ofp-util.c:parse_group_prop_ntr_selection_method() allows for assertion failure" }, { "cve": "CVE-2018-17205", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2018-09-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1632525" } ], "notes": [ { "category": "description", "text": "An issue was discovered in Open vSwitch (OvS), 2.7.x through 2.7.6, 2.8.x through 2.8.4, and 2.9.x through 2.9.2, where the ofproto_rule_insert__() function inside ofproto/ofproto.c is affected by an assertion failure under certain circumstances.\r\nA specially crafted flow update applied using the bundling feature of Open vSwitch could potentially cause the assertion failure, potentially leading to incorrect flow information being applied, or a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "openvswitch: Error during bundle commit in ofproto/ofproto.c:ofproto_rule_insert__() allows for crash", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.src", "7Server-RH7-RHOS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "7Server-RH7-RHOS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.src", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "7Server-RH7-RHOS-DEVTOOLS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-17205" }, { "category": "external", "summary": "RHBZ#1632525", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1632525" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-17205", "url": "https://www.cve.org/CVERecord?id=CVE-2018-17205" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-17205", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-17205" } ], "release_date": "2018-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-01-16T17:53:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.src", "7Server-RH7-RHOS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "7Server-RH7-RHOS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.src", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "7Server-RH7-RHOS-DEVTOOLS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:0081" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.src", "7Server-RH7-RHOS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "7Server-RH7-RHOS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.src", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "7Server-RH7-RHOS-DEVTOOLS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openvswitch: Error during bundle commit in ofproto/ofproto.c:ofproto_rule_insert__() allows for crash" }, { "cve": "CVE-2018-17206", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2018-09-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1632528" } ], "notes": [ { "category": "description", "text": "An issue was discovered in Open vSwitch (OvS) 2.5.x through 2.5.5, 2.6.x through 2.6.3, 2.7.x through 2.7.6, 2.8.x through 2.8.4, and 2.9.x through 2.9.2 where the decode_bundle function inside lib/ofp-actions.c is affected by a buffer over-read issue during BUNDLE action decoding.\r\nA specially crafted flow update applied using the bundling feature of Open vSwitch could potentially cause a crash leading to a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "openvswitch: Buffer over-read in lib/ofp-actions.c:decode_bundle()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.src", "7Server-RH7-RHOS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "7Server-RH7-RHOS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.src", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "7Server-RH7-RHOS-DEVTOOLS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-17206" }, { "category": "external", "summary": "RHBZ#1632528", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1632528" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-17206", "url": "https://www.cve.org/CVERecord?id=CVE-2018-17206" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-17206", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-17206" } ], "release_date": "2018-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-01-16T17:53:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.src", "7Server-RH7-RHOS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "7Server-RH7-RHOS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.src", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "7Server-RH7-RHOS-DEVTOOLS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:0081" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.src", "7Server-RH7-RHOS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "7Server-RH7-RHOS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.src", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "7Server-RH7-RHOS-DEVTOOLS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openvswitch: Buffer over-read in lib/ofp-actions.c:decode_bundle()" } ] }
rhsa-2018_3500
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for openvswitch is now available for Fast Datapath for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Open vSwitch provides standard network bridging functions and support for the OpenFlow protocol for remote per-flow control of traffic.\n\nSecurity Fix(es):\n\n* openvswitch: Mishandle of group mods in lib/ofp-util.c:parse_group_prop_ntr_selection_method() allows for assertion failure (CVE-2018-17204)\n\n* openvswitch: Error during bundle commit in ofproto/ofproto.c:ofproto_rule_insert__() allows for crash (CVE-2018-17205)\n\n* openvswitch: Buffer over-read in lib/ofp-actions.c:decode_bundle() (CVE-2018-17206)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Previously, when the ovs-vswitchd service restarted, an error displayed with many open files. With this update, the number of sockets opened by ovs-vswitchd is decreased. As a result, the described problem no longer occurs. (BZ#1526306)\n\n* Previously, when OpenvSwitch service was reloaded, the default flow was not removed and it became part of the final flow table. With this update, the default flow rule is no longer added after a service reload. As a result, the described problem no longer occurs. (BZ#1626096)\n\nEnhancement(s):\n\n* With this update, the pmd-rxq-assign configuration has been added to Poll Mode Drivers (PMDs) cores. This allows users to select a round-robin assignment. (BZ#1616001)\n\n* With this update the ovs-appctl connection-status command has been introduced to the ovs-appctl utility. The command enables to monitor hypervisor (HV) south bound database (SBDB) connection status. Layered products can now check if the ovn-controller is properly connected to a central node. (BZ#1593804)\n\n* With this update, a support for the Dynamic Host Configuration Protocol (DHCP) option 252 has been added to Open Virtual Network (OVN) Native DHCP. (BZ#1641765)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:3500", "url": "https://access.redhat.com/errata/RHSA-2018:3500" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1526306", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1526306" }, { "category": "external", "summary": "1580217", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1580217" }, { "category": "external", "summary": "1593804", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1593804" }, { "category": "external", "summary": "1609643", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1609643" }, { "category": "external", "summary": "1616001", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616001" }, { "category": "external", "summary": "1618488", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618488" }, { "category": "external", "summary": "1626096", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1626096" }, { "category": "external", "summary": "1627711", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1627711" }, { "category": "external", "summary": "1632522", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1632522" }, { "category": "external", "summary": "1632525", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1632525" }, { "category": "external", "summary": "1632528", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1632528" }, { "category": "external", "summary": "1641765", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1641765" }, { "category": "external", "summary": "1643527", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1643527" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_3500.json" } ], "title": "Red Hat Security Advisory: openvswitch security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-11-15T00:37:10+00:00", "generator": { "date": "2024-11-15T00:37:10+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2018:3500", "initial_release_date": "2018-11-05T14:56:37+00:00", "revision_history": [ { "date": "2018-11-05T14:56:37+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-11-05T14:56:37+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T00:37:10+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Fast Datapath for Red Hat Enterprise Linux 7", "product": { "name": "Fast Datapath for Red Hat Enterprise Linux 7", "product_id": "7Server-RH7-Fast-Datapath", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::fastdatapath" } } }, { "category": "product_name", "name": "Red Hat Virtualization 4.2 Management Agent for RHEL 7.6 EUS Hosts", "product": { "name": "Red Hat Virtualization 4.2 Management Agent for RHEL 7.6 EUS Hosts", "product_id": "7Server-7.6.EUS-RHV-4.2-Agents-eus", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor" } } } ], "category": "product_family", "name": "Fast Datapath" }, { "branches": [ { "category": "product_version", "name": "openvswitch-0:2.9.0-70.el7fdp.1.x86_64", "product": { "name": "openvswitch-0:2.9.0-70.el7fdp.1.x86_64", "product_id": "openvswitch-0:2.9.0-70.el7fdp.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch@2.9.0-70.el7fdp.1?arch=x86_64" } } }, { "category": "product_version", "name": "openvswitch-devel-0:2.9.0-70.el7fdp.1.x86_64", "product": { "name": "openvswitch-devel-0:2.9.0-70.el7fdp.1.x86_64", "product_id": "openvswitch-devel-0:2.9.0-70.el7fdp.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch-devel@2.9.0-70.el7fdp.1?arch=x86_64" } } }, { "category": "product_version", "name": "openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.x86_64", "product": { "name": "openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.x86_64", "product_id": "openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch-ovn-central@2.9.0-70.el7fdp.1?arch=x86_64" } } }, { "category": "product_version", "name": "openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.x86_64", "product": { "name": "openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.x86_64", "product_id": "openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch-ovn-common@2.9.0-70.el7fdp.1?arch=x86_64" } } }, { "category": "product_version", "name": "openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.x86_64", "product": { "name": "openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.x86_64", "product_id": "openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch-debuginfo@2.9.0-70.el7fdp.1?arch=x86_64" } } }, { "category": "product_version", "name": "python-openvswitch-0:2.9.0-70.el7fdp.1.x86_64", "product": { "name": "python-openvswitch-0:2.9.0-70.el7fdp.1.x86_64", "product_id": "python-openvswitch-0:2.9.0-70.el7fdp.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-openvswitch@2.9.0-70.el7fdp.1?arch=x86_64" } } }, { "category": "product_version", "name": "openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.x86_64", "product": { "name": "openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.x86_64", "product_id": "openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch-ovn-vtep@2.9.0-70.el7fdp.1?arch=x86_64" } } }, { "category": "product_version", "name": "openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.x86_64", "product": { "name": "openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.x86_64", "product_id": "openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch-ovn-host@2.9.0-70.el7fdp.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openvswitch-0:2.9.0-70.el7fdp.1.src", "product": { "name": "openvswitch-0:2.9.0-70.el7fdp.1.src", "product_id": "openvswitch-0:2.9.0-70.el7fdp.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch@2.9.0-70.el7fdp.1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "product": { "name": "openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "product_id": "openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch@2.9.0-70.el7fdp.1?arch=ppc64le" } } }, { "category": "product_version", "name": "openvswitch-devel-0:2.9.0-70.el7fdp.1.ppc64le", "product": { "name": "openvswitch-devel-0:2.9.0-70.el7fdp.1.ppc64le", "product_id": "openvswitch-devel-0:2.9.0-70.el7fdp.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch-devel@2.9.0-70.el7fdp.1?arch=ppc64le" } } }, { "category": "product_version", "name": "openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.ppc64le", "product": { "name": "openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.ppc64le", "product_id": "openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch-ovn-central@2.9.0-70.el7fdp.1?arch=ppc64le" } } }, { "category": "product_version", "name": "openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.ppc64le", "product": { "name": "openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.ppc64le", "product_id": "openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch-ovn-common@2.9.0-70.el7fdp.1?arch=ppc64le" } } }, { "category": "product_version", "name": "openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.ppc64le", "product": { "name": "openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.ppc64le", "product_id": "openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch-debuginfo@2.9.0-70.el7fdp.1?arch=ppc64le" } } }, { "category": "product_version", "name": "python-openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "product": { "name": "python-openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "product_id": "python-openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-openvswitch@2.9.0-70.el7fdp.1?arch=ppc64le" } } }, { "category": "product_version", "name": "openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.ppc64le", "product": { "name": "openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.ppc64le", "product_id": "openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch-ovn-vtep@2.9.0-70.el7fdp.1?arch=ppc64le" } } }, { "category": "product_version", "name": "openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.ppc64le", "product": { "name": "openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.ppc64le", "product_id": "openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch-ovn-host@2.9.0-70.el7fdp.1?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "openvswitch-test-0:2.9.0-70.el7fdp.1.noarch", "product": { "name": "openvswitch-test-0:2.9.0-70.el7fdp.1.noarch", "product_id": "openvswitch-test-0:2.9.0-70.el7fdp.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch-test@2.9.0-70.el7fdp.1?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openvswitch-0:2.9.0-70.el7fdp.1.ppc64le as a component of Red Hat Virtualization 4.2 Management Agent for RHEL 7.6 EUS Hosts", "product_id": "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-0:2.9.0-70.el7fdp.1.ppc64le" }, "product_reference": "openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Agents-eus" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-0:2.9.0-70.el7fdp.1.src as a component of Red Hat Virtualization 4.2 Management Agent for RHEL 7.6 EUS Hosts", "product_id": "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-0:2.9.0-70.el7fdp.1.src" }, "product_reference": "openvswitch-0:2.9.0-70.el7fdp.1.src", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Agents-eus" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-0:2.9.0-70.el7fdp.1.x86_64 as a component of Red Hat Virtualization 4.2 Management Agent for RHEL 7.6 EUS Hosts", "product_id": "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-0:2.9.0-70.el7fdp.1.x86_64" }, "product_reference": "openvswitch-0:2.9.0-70.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Agents-eus" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.ppc64le as a component of Red Hat Virtualization 4.2 Management Agent for RHEL 7.6 EUS Hosts", "product_id": "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.ppc64le" }, "product_reference": "openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.ppc64le", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Agents-eus" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.x86_64 as a component of Red Hat Virtualization 4.2 Management Agent for RHEL 7.6 EUS Hosts", "product_id": "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.x86_64" }, "product_reference": "openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Agents-eus" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-devel-0:2.9.0-70.el7fdp.1.ppc64le as a component of Red Hat Virtualization 4.2 Management Agent for RHEL 7.6 EUS Hosts", "product_id": "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-devel-0:2.9.0-70.el7fdp.1.ppc64le" }, "product_reference": "openvswitch-devel-0:2.9.0-70.el7fdp.1.ppc64le", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Agents-eus" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-devel-0:2.9.0-70.el7fdp.1.x86_64 as a component of Red Hat Virtualization 4.2 Management Agent for RHEL 7.6 EUS Hosts", "product_id": "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-devel-0:2.9.0-70.el7fdp.1.x86_64" }, "product_reference": "openvswitch-devel-0:2.9.0-70.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Agents-eus" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.ppc64le as a component of Red Hat Virtualization 4.2 Management Agent for RHEL 7.6 EUS Hosts", "product_id": "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.ppc64le" }, "product_reference": "openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.ppc64le", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Agents-eus" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.x86_64 as a component of Red Hat Virtualization 4.2 Management Agent for RHEL 7.6 EUS Hosts", "product_id": "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.x86_64" }, "product_reference": "openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Agents-eus" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.ppc64le as a component of Red Hat Virtualization 4.2 Management Agent for RHEL 7.6 EUS Hosts", "product_id": "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.ppc64le" }, "product_reference": "openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.ppc64le", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Agents-eus" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.x86_64 as a component of Red Hat Virtualization 4.2 Management Agent for RHEL 7.6 EUS Hosts", "product_id": "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.x86_64" }, "product_reference": "openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Agents-eus" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.ppc64le as a component of Red Hat Virtualization 4.2 Management Agent for RHEL 7.6 EUS Hosts", "product_id": "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.ppc64le" }, "product_reference": "openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.ppc64le", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Agents-eus" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.x86_64 as a component of Red Hat Virtualization 4.2 Management Agent for RHEL 7.6 EUS Hosts", "product_id": "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.x86_64" }, "product_reference": "openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Agents-eus" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.ppc64le as a component of Red Hat Virtualization 4.2 Management Agent for RHEL 7.6 EUS Hosts", "product_id": "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.ppc64le" }, "product_reference": "openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.ppc64le", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Agents-eus" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.x86_64 as a component of Red Hat Virtualization 4.2 Management Agent for RHEL 7.6 EUS Hosts", "product_id": "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.x86_64" }, "product_reference": "openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Agents-eus" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-test-0:2.9.0-70.el7fdp.1.noarch as a component of Red Hat Virtualization 4.2 Management Agent for RHEL 7.6 EUS Hosts", "product_id": "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-test-0:2.9.0-70.el7fdp.1.noarch" }, "product_reference": "openvswitch-test-0:2.9.0-70.el7fdp.1.noarch", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Agents-eus" }, { "category": "default_component_of", "full_product_name": { "name": "python-openvswitch-0:2.9.0-70.el7fdp.1.ppc64le as a component of Red Hat Virtualization 4.2 Management Agent for RHEL 7.6 EUS Hosts", "product_id": "7Server-7.6.EUS-RHV-4.2-Agents-eus:python-openvswitch-0:2.9.0-70.el7fdp.1.ppc64le" }, "product_reference": "python-openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Agents-eus" }, { "category": "default_component_of", "full_product_name": { "name": "python-openvswitch-0:2.9.0-70.el7fdp.1.x86_64 as a component of Red Hat Virtualization 4.2 Management Agent for RHEL 7.6 EUS Hosts", "product_id": "7Server-7.6.EUS-RHV-4.2-Agents-eus:python-openvswitch-0:2.9.0-70.el7fdp.1.x86_64" }, "product_reference": "python-openvswitch-0:2.9.0-70.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Agents-eus" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-0:2.9.0-70.el7fdp.1.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 7", "product_id": "7Server-RH7-Fast-Datapath:openvswitch-0:2.9.0-70.el7fdp.1.ppc64le" }, "product_reference": "openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "relates_to_product_reference": "7Server-RH7-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-0:2.9.0-70.el7fdp.1.src as a component of Fast Datapath for Red Hat Enterprise Linux 7", "product_id": "7Server-RH7-Fast-Datapath:openvswitch-0:2.9.0-70.el7fdp.1.src" }, "product_reference": "openvswitch-0:2.9.0-70.el7fdp.1.src", "relates_to_product_reference": "7Server-RH7-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-0:2.9.0-70.el7fdp.1.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 7", "product_id": "7Server-RH7-Fast-Datapath:openvswitch-0:2.9.0-70.el7fdp.1.x86_64" }, "product_reference": "openvswitch-0:2.9.0-70.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-RH7-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 7", "product_id": "7Server-RH7-Fast-Datapath:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.ppc64le" }, "product_reference": "openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.ppc64le", "relates_to_product_reference": "7Server-RH7-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 7", "product_id": "7Server-RH7-Fast-Datapath:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.x86_64" }, "product_reference": "openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-RH7-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-devel-0:2.9.0-70.el7fdp.1.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 7", "product_id": "7Server-RH7-Fast-Datapath:openvswitch-devel-0:2.9.0-70.el7fdp.1.ppc64le" }, "product_reference": "openvswitch-devel-0:2.9.0-70.el7fdp.1.ppc64le", "relates_to_product_reference": "7Server-RH7-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-devel-0:2.9.0-70.el7fdp.1.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 7", "product_id": "7Server-RH7-Fast-Datapath:openvswitch-devel-0:2.9.0-70.el7fdp.1.x86_64" }, "product_reference": "openvswitch-devel-0:2.9.0-70.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-RH7-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 7", "product_id": "7Server-RH7-Fast-Datapath:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.ppc64le" }, "product_reference": "openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.ppc64le", "relates_to_product_reference": "7Server-RH7-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 7", "product_id": "7Server-RH7-Fast-Datapath:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.x86_64" }, "product_reference": "openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-RH7-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 7", "product_id": "7Server-RH7-Fast-Datapath:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.ppc64le" }, "product_reference": "openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.ppc64le", "relates_to_product_reference": "7Server-RH7-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 7", "product_id": "7Server-RH7-Fast-Datapath:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.x86_64" }, "product_reference": "openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-RH7-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 7", "product_id": "7Server-RH7-Fast-Datapath:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.ppc64le" }, "product_reference": "openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.ppc64le", "relates_to_product_reference": "7Server-RH7-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 7", "product_id": "7Server-RH7-Fast-Datapath:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.x86_64" }, "product_reference": "openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-RH7-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 7", "product_id": "7Server-RH7-Fast-Datapath:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.ppc64le" }, "product_reference": "openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.ppc64le", "relates_to_product_reference": "7Server-RH7-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 7", "product_id": "7Server-RH7-Fast-Datapath:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.x86_64" }, "product_reference": "openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-RH7-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-test-0:2.9.0-70.el7fdp.1.noarch as a component of Fast Datapath for Red Hat Enterprise Linux 7", "product_id": "7Server-RH7-Fast-Datapath:openvswitch-test-0:2.9.0-70.el7fdp.1.noarch" }, "product_reference": "openvswitch-test-0:2.9.0-70.el7fdp.1.noarch", "relates_to_product_reference": "7Server-RH7-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "python-openvswitch-0:2.9.0-70.el7fdp.1.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 7", "product_id": "7Server-RH7-Fast-Datapath:python-openvswitch-0:2.9.0-70.el7fdp.1.ppc64le" }, "product_reference": "python-openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "relates_to_product_reference": "7Server-RH7-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "python-openvswitch-0:2.9.0-70.el7fdp.1.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 7", "product_id": "7Server-RH7-Fast-Datapath:python-openvswitch-0:2.9.0-70.el7fdp.1.x86_64" }, "product_reference": "python-openvswitch-0:2.9.0-70.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-RH7-Fast-Datapath" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-17204", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2018-09-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1632522" } ], "notes": [ { "category": "description", "text": "An issue was discovered in Open vSwitch (OvS), 2.4.x through 2.4.1, 2.5.x through 2.5.5, 2.6.x through 2.6.3, 2.7.x through 2.7.6, 2.8.x through 2.8.4, and2.9.x through 2.9.2, affecting the parse_group_prop_ntr_selection_method in lib/ofp-util.c. On controllers with the OpenFlow 1.5 decoder enabled, a specially crafted group update can cause an assertion failure, potentially leading to a Denial of Service condition.", "title": "Vulnerability description" }, { "category": "summary", "text": "openvswitch: Mishandle of group mods in lib/ofp-util.c:parse_group_prop_ntr_selection_method() allows for assertion failure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-0:2.9.0-70.el7fdp.1.src", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-devel-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-devel-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-test-0:2.9.0-70.el7fdp.1.noarch", "7Server-7.6.EUS-RHV-4.2-Agents-eus:python-openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:python-openvswitch-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-0:2.9.0-70.el7fdp.1.src", "7Server-RH7-Fast-Datapath:openvswitch-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-devel-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-devel-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-test-0:2.9.0-70.el7fdp.1.noarch", "7Server-RH7-Fast-Datapath:python-openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:python-openvswitch-0:2.9.0-70.el7fdp.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-17204" }, { "category": "external", "summary": "RHBZ#1632522", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1632522" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-17204", "url": "https://www.cve.org/CVERecord?id=CVE-2018-17204" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-17204", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-17204" } ], "release_date": "2018-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-11-05T14:56:37+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-0:2.9.0-70.el7fdp.1.src", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-devel-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-devel-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-test-0:2.9.0-70.el7fdp.1.noarch", "7Server-7.6.EUS-RHV-4.2-Agents-eus:python-openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:python-openvswitch-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-0:2.9.0-70.el7fdp.1.src", "7Server-RH7-Fast-Datapath:openvswitch-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-devel-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-devel-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-test-0:2.9.0-70.el7fdp.1.noarch", "7Server-RH7-Fast-Datapath:python-openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:python-openvswitch-0:2.9.0-70.el7fdp.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:3500" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 2.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-0:2.9.0-70.el7fdp.1.src", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-devel-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-devel-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-test-0:2.9.0-70.el7fdp.1.noarch", "7Server-7.6.EUS-RHV-4.2-Agents-eus:python-openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:python-openvswitch-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-0:2.9.0-70.el7fdp.1.src", "7Server-RH7-Fast-Datapath:openvswitch-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-devel-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-devel-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-test-0:2.9.0-70.el7fdp.1.noarch", "7Server-RH7-Fast-Datapath:python-openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:python-openvswitch-0:2.9.0-70.el7fdp.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openvswitch: Mishandle of group mods in lib/ofp-util.c:parse_group_prop_ntr_selection_method() allows for assertion failure" }, { "cve": "CVE-2018-17205", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2018-09-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1632525" } ], "notes": [ { "category": "description", "text": "An issue was discovered in Open vSwitch (OvS), 2.7.x through 2.7.6, 2.8.x through 2.8.4, and 2.9.x through 2.9.2, where the ofproto_rule_insert__() function inside ofproto/ofproto.c is affected by an assertion failure under certain circumstances.\r\nA specially crafted flow update applied using the bundling feature of Open vSwitch could potentially cause the assertion failure, potentially leading to incorrect flow information being applied, or a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "openvswitch: Error during bundle commit in ofproto/ofproto.c:ofproto_rule_insert__() allows for crash", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-0:2.9.0-70.el7fdp.1.src", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-devel-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-devel-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-test-0:2.9.0-70.el7fdp.1.noarch", "7Server-7.6.EUS-RHV-4.2-Agents-eus:python-openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:python-openvswitch-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-0:2.9.0-70.el7fdp.1.src", "7Server-RH7-Fast-Datapath:openvswitch-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-devel-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-devel-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-test-0:2.9.0-70.el7fdp.1.noarch", "7Server-RH7-Fast-Datapath:python-openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:python-openvswitch-0:2.9.0-70.el7fdp.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-17205" }, { "category": "external", "summary": "RHBZ#1632525", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1632525" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-17205", "url": "https://www.cve.org/CVERecord?id=CVE-2018-17205" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-17205", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-17205" } ], "release_date": "2018-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-11-05T14:56:37+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-0:2.9.0-70.el7fdp.1.src", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-devel-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-devel-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-test-0:2.9.0-70.el7fdp.1.noarch", "7Server-7.6.EUS-RHV-4.2-Agents-eus:python-openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:python-openvswitch-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-0:2.9.0-70.el7fdp.1.src", "7Server-RH7-Fast-Datapath:openvswitch-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-devel-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-devel-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-test-0:2.9.0-70.el7fdp.1.noarch", "7Server-RH7-Fast-Datapath:python-openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:python-openvswitch-0:2.9.0-70.el7fdp.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:3500" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-0:2.9.0-70.el7fdp.1.src", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-devel-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-devel-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-test-0:2.9.0-70.el7fdp.1.noarch", "7Server-7.6.EUS-RHV-4.2-Agents-eus:python-openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:python-openvswitch-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-0:2.9.0-70.el7fdp.1.src", "7Server-RH7-Fast-Datapath:openvswitch-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-devel-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-devel-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-test-0:2.9.0-70.el7fdp.1.noarch", "7Server-RH7-Fast-Datapath:python-openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:python-openvswitch-0:2.9.0-70.el7fdp.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openvswitch: Error during bundle commit in ofproto/ofproto.c:ofproto_rule_insert__() allows for crash" }, { "cve": "CVE-2018-17206", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2018-09-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1632528" } ], "notes": [ { "category": "description", "text": "An issue was discovered in Open vSwitch (OvS) 2.5.x through 2.5.5, 2.6.x through 2.6.3, 2.7.x through 2.7.6, 2.8.x through 2.8.4, and 2.9.x through 2.9.2 where the decode_bundle function inside lib/ofp-actions.c is affected by a buffer over-read issue during BUNDLE action decoding.\r\nA specially crafted flow update applied using the bundling feature of Open vSwitch could potentially cause a crash leading to a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "openvswitch: Buffer over-read in lib/ofp-actions.c:decode_bundle()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-0:2.9.0-70.el7fdp.1.src", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-devel-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-devel-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-test-0:2.9.0-70.el7fdp.1.noarch", "7Server-7.6.EUS-RHV-4.2-Agents-eus:python-openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:python-openvswitch-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-0:2.9.0-70.el7fdp.1.src", "7Server-RH7-Fast-Datapath:openvswitch-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-devel-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-devel-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-test-0:2.9.0-70.el7fdp.1.noarch", "7Server-RH7-Fast-Datapath:python-openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:python-openvswitch-0:2.9.0-70.el7fdp.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-17206" }, { "category": "external", "summary": "RHBZ#1632528", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1632528" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-17206", "url": "https://www.cve.org/CVERecord?id=CVE-2018-17206" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-17206", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-17206" } ], "release_date": "2018-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-11-05T14:56:37+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-0:2.9.0-70.el7fdp.1.src", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-devel-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-devel-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-test-0:2.9.0-70.el7fdp.1.noarch", "7Server-7.6.EUS-RHV-4.2-Agents-eus:python-openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:python-openvswitch-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-0:2.9.0-70.el7fdp.1.src", "7Server-RH7-Fast-Datapath:openvswitch-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-devel-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-devel-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-test-0:2.9.0-70.el7fdp.1.noarch", "7Server-RH7-Fast-Datapath:python-openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:python-openvswitch-0:2.9.0-70.el7fdp.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:3500" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-0:2.9.0-70.el7fdp.1.src", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-devel-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-devel-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-test-0:2.9.0-70.el7fdp.1.noarch", "7Server-7.6.EUS-RHV-4.2-Agents-eus:python-openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:python-openvswitch-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-0:2.9.0-70.el7fdp.1.src", "7Server-RH7-Fast-Datapath:openvswitch-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-devel-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-devel-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-test-0:2.9.0-70.el7fdp.1.noarch", "7Server-RH7-Fast-Datapath:python-openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:python-openvswitch-0:2.9.0-70.el7fdp.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openvswitch: Buffer over-read in lib/ofp-actions.c:decode_bundle()" } ] }
rhba-2018_3683
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated redhat-virtualization-host packages that fix several bugs and add\nvarious enhancements are now available.", "title": "Topic" }, { "category": "general", "text": "The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHBA-2018:3683", "url": "https://access.redhat.com/errata/RHBA-2018:3683" }, { "category": "external", "summary": "1651524", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1651524" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhba-2018_3683.json" } ], "title": "Red Hat Bug Fix Advisory: Important: redhat-virtualization-host bug fix and enhancement update", "tracking": { "current_release_date": "2024-11-15T00:33:50+00:00", "generator": { "date": "2024-11-15T00:33:50+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHBA-2018:3683", "initial_release_date": "2018-11-27T13:19:18+00:00", "revision_history": [ { "date": "2018-11-27T13:19:18+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-11-27T13:19:18+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T00:33:50+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product": { "name": "RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product_id": "7Server-RHEV-4-HypervisorBuild-7", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor" } } }, { "category": "product_name", "name": "Red Hat Virtualization 4 Hypervisor for RHEL 7", "product": { "name": "Red Hat Virtualization 4 Hypervisor for RHEL 7", "product_id": "7Server-RHEV-4-Hypervisor-7", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor" } } } ], "category": "product_family", "name": "Red Hat Virtualization" }, { "branches": [ { "category": "product_version", "name": "redhat-release-virtualization-host-0:4.2-7.5.el7.x86_64", "product": { "name": "redhat-release-virtualization-host-0:4.2-7.5.el7.x86_64", "product_id": "redhat-release-virtualization-host-0:4.2-7.5.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.2-7.5.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "redhat-release-virtualization-host-0:4.2-7.5.el7.src", "product": { "name": "redhat-release-virtualization-host-0:4.2-7.5.el7.src", "product_id": "redhat-release-virtualization-host-0:4.2-7.5.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.2-7.5.el7?arch=src" } } }, { "category": "product_version", "name": "redhat-virtualization-host-0:4.2-20181121.0.el7_6.src", "product": { "name": "redhat-virtualization-host-0:4.2-20181121.0.el7_6.src", "product_id": "redhat-virtualization-host-0:4.2-20181121.0.el7_6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-virtualization-host@4.2-20181121.0.el7_6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "redhat-virtualization-host-image-update-placeholder-0:4.2-7.5.el7.noarch", "product": { "name": "redhat-virtualization-host-image-update-placeholder-0:4.2-7.5.el7.noarch", "product_id": "redhat-virtualization-host-image-update-placeholder-0:4.2-7.5.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update-placeholder@4.2-7.5.el7?arch=noarch" } } }, { "category": "product_version", "name": "redhat-virtualization-host-image-update-0:4.2-20181121.0.el7_6.noarch", "product": { "name": "redhat-virtualization-host-image-update-0:4.2-20181121.0.el7_6.noarch", "product_id": "redhat-virtualization-host-image-update-0:4.2-20181121.0.el7_6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update@4.2-20181121.0.el7_6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "redhat-virtualization-host-0:4.2-20181121.0.el7_6.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7", "product_id": "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20181121.0.el7_6.src" }, "product_reference": "redhat-virtualization-host-0:4.2-20181121.0.el7_6.src", "relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-virtualization-host-image-update-0:4.2-20181121.0.el7_6.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7", "product_id": "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20181121.0.el7_6.noarch" }, "product_reference": "redhat-virtualization-host-image-update-0:4.2-20181121.0.el7_6.noarch", "relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-release-virtualization-host-0:4.2-7.5.el7.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-7.5.el7.src" }, "product_reference": "redhat-release-virtualization-host-0:4.2-7.5.el7.src", "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-release-virtualization-host-0:4.2-7.5.el7.x86_64 as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-7.5.el7.x86_64" }, "product_reference": "redhat-release-virtualization-host-0:4.2-7.5.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-virtualization-host-image-update-placeholder-0:4.2-7.5.el7.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-7.5.el7.noarch" }, "product_reference": "redhat-virtualization-host-image-update-placeholder-0:4.2-7.5.el7.noarch", "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-17204", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2018-09-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1632522" } ], "notes": [ { "category": "description", "text": "An issue was discovered in Open vSwitch (OvS), 2.4.x through 2.4.1, 2.5.x through 2.5.5, 2.6.x through 2.6.3, 2.7.x through 2.7.6, 2.8.x through 2.8.4, and2.9.x through 2.9.2, affecting the parse_group_prop_ntr_selection_method in lib/ofp-util.c. On controllers with the OpenFlow 1.5 decoder enabled, a specially crafted group update can cause an assertion failure, potentially leading to a Denial of Service condition.", "title": "Vulnerability description" }, { "category": "summary", "text": "openvswitch: Mishandle of group mods in lib/ofp-util.c:parse_group_prop_ntr_selection_method() allows for assertion failure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20181121.0.el7_6.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20181121.0.el7_6.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-7.5.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-7.5.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-7.5.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-17204" }, { "category": "external", "summary": "RHBZ#1632522", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1632522" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-17204", "url": "https://www.cve.org/CVERecord?id=CVE-2018-17204" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-17204", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-17204" } ], "release_date": "2018-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-11-27T13:19:18+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20181121.0.el7_6.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20181121.0.el7_6.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-7.5.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-7.5.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-7.5.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHBA-2018:3683" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 2.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20181121.0.el7_6.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20181121.0.el7_6.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-7.5.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-7.5.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-7.5.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openvswitch: Mishandle of group mods in lib/ofp-util.c:parse_group_prop_ntr_selection_method() allows for assertion failure" } ] }
var-201809-0305
Vulnerability from variot
An issue was discovered in Open vSwitch (OvS) 2.7.x through 2.7.6, affecting parse_group_prop_ntr_selection_method in lib/ofp-util.c. When decoding a group mod, it validates the group type and command after the whole group mod has been decoded. The OF1.5 decoder, however, tries to use the type and command earlier, when it might still be invalid. This causes an assertion failure (via OVS_NOT_REACHED). ovs-vswitchd does not enable support for OpenFlow 1.5 by default. Open vSwitch (OvS) Contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Open vSwitch (OvS) is a multi-layer virtual switch product based on open source technology (according to the Apache2.0 license). It supports large-scale network automation, standard management interfaces and protocols, etc. through programming extensions. There is a security vulnerability in the 'parse_group_prop_ntr_selection_method' function of the lib/ofp-util.c file in OvS 2.7.x to 2.7.6. An attacker can exploit this vulnerability to cause an assertion to fail. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
===================================================================== Red Hat Security Advisory
Synopsis: Moderate: openvswitch security, bug fix, and enhancement update Advisory ID: RHSA-2018:3500-01 Product: Fast Datapath Advisory URL: https://access.redhat.com/errata/RHSA-2018:3500 Issue date: 2018-11-05 CVE Names: CVE-2018-17204 CVE-2018-17205 CVE-2018-17206 =====================================================================
- Summary:
An update for openvswitch is now available for Fast Datapath for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Relevant releases/architectures:
Channel to provide early releases to layered products - noarch, ppc64le, x86_64
- Description:
Open vSwitch provides standard network bridging functions and support for the OpenFlow protocol for remote per-flow control of traffic.
Security Fix(es):
-
openvswitch: Mishandle of group mods in lib/ofp-util.c:parse_group_prop_ntr_selection_method() allows for assertion failure (CVE-2018-17204)
-
openvswitch: Error during bundle commit in ofproto/ofproto.c:ofproto_rule_insert__() allows for crash (CVE-2018-17205)
-
openvswitch: Buffer over-read in lib/ofp-actions.c:decode_bundle() (CVE-2018-17206)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
-
Previously, when the ovs-vswitchd service restarted, an error displayed with many open files. With this update, the number of sockets opened by ovs-vswitchd is decreased. As a result, the described problem no longer occurs. (BZ#1526306)
-
Previously, when OpenvSwitch service was reloaded, the default flow was not removed and it became part of the final flow table. With this update, the default flow rule is no longer added after a service reload. As a result, the described problem no longer occurs. (BZ#1626096)
Enhancement(s):
-
With this update, the pmd-rxq-assign configuration has been added to Poll Mode Drivers (PMDs) cores. This allows users to select a round-robin assignment. (BZ#1616001)
-
With this update the ovs-appctl connection-status command has been introduced to the ovs-appctl utility. The command enables to monitor hypervisor (HV) south bound database (SBDB) connection status. Layered products can now check if the ovn-controller is properly connected to a central node. (BZ#1593804)
-
With this update, a support for the Dynamic Host Configuration Protocol (DHCP) option 252 has been added to Open Virtual Network (OVN) Native DHCP. (BZ#1641765)
-
Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
- Bugs fixed (https://bugzilla.redhat.com/):
1526306 - ovs-vswitchd service hangs with Error too many open files 1580217 - [ovn]ipv6 load balancer for layer4 on logical router doesn't work 1593804 - ovn-controller: report when was the most recent successful communication with central 1609643 - Running/destroying testpmd in guest which enabling vIOMMU can cause host ovs-vswitchd[10869]: segfault 1616001 - [RFE] Add option to OVS 2.9 for legacy RXQ assignment to cores 1618488 - vhost-user backend crash on SET_MEM_TABLE request handling while port enabled 1626096 - systemctl reload openvswitch includes default flow. 1627711 - Backport "net/mlx{4,5}: avoid stripping the glue library" commits 1632522 - CVE-2018-17204 openvswitch: Mishandle of group mods in lib/ofp-util.c:parse_group_prop_ntr_selection_method() allows for assertion failure 1632525 - CVE-2018-17205 openvswitch: Error during bundle commit in ofproto/ofproto.c:ofproto_rule_insert__() allows for crash 1632528 - CVE-2018-17206 openvswitch: Buffer over-read in lib/ofp-actions.c:decode_bundle() 1641765 - [RFE] Support DHCP Option 252 in OVN Native DHCP 1643527 - Link OVS binaries statically
- Package List:
Channel to provide early releases to layered products:
Source: openvswitch-2.9.0-70.el7fdp.1.src.rpm
noarch: openvswitch-test-2.9.0-70.el7fdp.1.noarch.rpm
ppc64le: openvswitch-2.9.0-70.el7fdp.1.ppc64le.rpm openvswitch-debuginfo-2.9.0-70.el7fdp.1.ppc64le.rpm openvswitch-devel-2.9.0-70.el7fdp.1.ppc64le.rpm openvswitch-ovn-central-2.9.0-70.el7fdp.1.ppc64le.rpm openvswitch-ovn-common-2.9.0-70.el7fdp.1.ppc64le.rpm openvswitch-ovn-host-2.9.0-70.el7fdp.1.ppc64le.rpm openvswitch-ovn-vtep-2.9.0-70.el7fdp.1.ppc64le.rpm python-openvswitch-2.9.0-70.el7fdp.1.ppc64le.rpm
x86_64: openvswitch-2.9.0-70.el7fdp.1.x86_64.rpm openvswitch-debuginfo-2.9.0-70.el7fdp.1.x86_64.rpm openvswitch-devel-2.9.0-70.el7fdp.1.x86_64.rpm openvswitch-ovn-central-2.9.0-70.el7fdp.1.x86_64.rpm openvswitch-ovn-common-2.9.0-70.el7fdp.1.x86_64.rpm openvswitch-ovn-host-2.9.0-70.el7fdp.1.x86_64.rpm openvswitch-ovn-vtep-2.9.0-70.el7fdp.1.x86_64.rpm python-openvswitch-2.9.0-70.el7fdp.1.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2018-17204 https://access.redhat.com/security/cve/CVE-2018-17205 https://access.redhat.com/security/cve/CVE-2018-17206 https://access.redhat.com/security/updates/classification/#moderate
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2018 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIVAwUBW+BaCNzjgjWX9erEAQikXA/+OAaZIP3DWfdjyY8bMRbrRg9/VyGE3Go6 gS4wxrZh9yswHeG/RcTyfdWGceW/naWYC2fvPi+Vl8GRBoONNX76Z5bjkPx77/PF qUZpbNQG7aplbWkeuUIT1oWGDJ7Ax8Li0+zYBcr0MaOSiHJl5kOFsLYtYa/42WAg 9BgOeY+ZIJWrCNAFk6zGPGX/UejjZWuz/GJ7TL0V+W0XwvlPDZ4RCsmaCEBpYKrH R0SUmjl/fk3QCaMo77DfZeRLRPmFFNVYvIbx6OpZM/fA2neCpyBF6IkJF2KQbGoK JOTm85/ExVa2J6SO6LM6f/ZRhXciVZLPAYLvG/L/I4CWyyji8WEveNz+M3iHTooS hmqRw8msNBBogEQzke9KHVzuqQR14HhWs/lpeVI9KSh6fmkRnCpr3J764nNQhtHm f+ONma/8R0eqLsSSKoohQMrWy7WSAudDI9NriQwMAy0YqkRjCGZUOUR3A6jkaBFO MK6uaN1IhRG3h3JiNMuR5f4hVRaIPyGE7ltlbPzMyUcBBuWkk/Su/HOI2SitWO/Q fWQ00dttwLjtK73KiHHsskbFRLLE67DR+3AOQyC4lk9RLKN82kbfx8APly2Jr7Ec B9Q3AUpMArCK1kZy3VsWSNO48ECWpXPo2z7ZNZfF3veXDntYSF19ZkADstzYu2+Q Cb3Z9eM3UQQ= =Cdfr -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce .
Bug Fix(es):
-
Previously, the first packet of a new connection using an OVN logical router was used to discover the MAC address of the destination. This resulted in the loss of the first packet on the new connection. This enhancement adds the capability to correctly queue the first packet of a new connection, which prevents the loss of that packet. (BZ#1600115)
-
Bugs fixed (https://bugzilla.redhat.com/):
1600115 - ping loss of first packet with OVN l3 logical router. ========================================================================== Ubuntu Security Notice USN-3873-1 January 30, 2019
openvswitch vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
Summary:
Several security issues were fixed in Open vSwitch.
Software Description: - openvswitch: Ethernet virtual switch
Details:
It was discovered that Open vSwitch incorrectly decoded certain packets. A remote attacker could possibly use this issue to cause Open vSwitch to crash, resulting in a denial of service. A remote attacker could possibly use this issue to cause Open vSwitch to crash, resulting in a denial of service. This issue only affected Ubuntu 18.04 LTS. (CVE-2018-17205)
It was discovered that Open vSwitch incorrectly handled BUNDLE action decoding. A remote attacker could possibly use this issue to cause Open vSwitch to crash, resulting in a denial of service. (CVE-2018-17206)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 18.04 LTS: openvswitch-common 2.9.2-0ubuntu0.18.04.3
Ubuntu 16.04 LTS: openvswitch-common 2.5.5-0ubuntu0.16.04.2
In general, a standard system update will make all the necessary changes
Show details on source website{ "affected_products": { "_id": null, "data": [ { "_id": null, "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "18.04" }, { "_id": null, "model": "openstack", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "13" }, { "_id": null, "model": "openvswitch", "scope": "gte", "trust": 1.0, "vendor": "openvswitch", "version": "2.7.0" }, { "_id": null, "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "9.0" }, { "_id": null, "model": "openvswitch", "scope": "lte", "trust": 1.0, "vendor": "openvswitch", "version": "2.7.6" }, { "_id": null, "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "16.04" }, { "_id": null, "model": "openstack", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "10" }, { "_id": null, "model": "open vswitch", "scope": "eq", "trust": 0.8, "vendor": "open vswitch", "version": "2.7.6 for up to 2.7.x" }, { "_id": null, "model": "openstack", "scope": null, "trust": 0.8, "vendor": "red hat", "version": null }, { "_id": null, "model": "virtualization", "scope": null, "trust": 0.8, "vendor": "red hat", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-013985" }, { "db": "NVD", "id": "CVE-2018-17204" } ] }, "configurations": { "_id": null, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:openvswitch:openvswitch", "vulnerable": true }, { "cpe22Uri": "cpe:/a:redhat:openstack", "vulnerable": true }, { "cpe22Uri": "cpe:/a:redhat:virtualization", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-013985" } ] }, "credits": { "_id": null, "data": "Red Hat", "sources": [ { "db": "PACKETSTORM", "id": "151187" }, { "db": "PACKETSTORM", "id": "150175" }, { "db": "PACKETSTORM", "id": "151190" } ], "trust": 0.3 }, "cve": "CVE-2018-17204", "cvss": { "_id": null, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "exploitabilityScore": 8.0, "id": "CVE-2018-17204", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "exploitabilityScore": 8.0, "id": "VHN-127640", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:S/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.8, "id": "CVE-2018-17204", "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "Low", "baseScore": 4.3, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2018-17204", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2018-17204", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2018-17204", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-201809-882", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-127640", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-127640" }, { "db": "JVNDB", "id": "JVNDB-2018-013985" }, { "db": "CNNVD", "id": "CNNVD-201809-882" }, { "db": "NVD", "id": "CVE-2018-17204" } ] }, "description": { "_id": null, "data": "An issue was discovered in Open vSwitch (OvS) 2.7.x through 2.7.6, affecting parse_group_prop_ntr_selection_method in lib/ofp-util.c. When decoding a group mod, it validates the group type and command after the whole group mod has been decoded. The OF1.5 decoder, however, tries to use the type and command earlier, when it might still be invalid. This causes an assertion failure (via OVS_NOT_REACHED). ovs-vswitchd does not enable support for OpenFlow 1.5 by default. Open vSwitch (OvS) Contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Open vSwitch (OvS) is a multi-layer virtual switch product based on open source technology (according to the Apache2.0 license). It supports large-scale network automation, standard management interfaces and protocols, etc. through programming extensions. There is a security vulnerability in the \u0027parse_group_prop_ntr_selection_method\u0027 function of the lib/ofp-util.c file in OvS 2.7.x to 2.7.6. An attacker can exploit this vulnerability to cause an assertion to fail. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Moderate: openvswitch security, bug fix, and enhancement update\nAdvisory ID: RHSA-2018:3500-01\nProduct: Fast Datapath\nAdvisory URL: https://access.redhat.com/errata/RHSA-2018:3500\nIssue date: 2018-11-05\nCVE Names: CVE-2018-17204 CVE-2018-17205 CVE-2018-17206 \n=====================================================================\n\n1. Summary:\n\nAn update for openvswitch is now available for Fast Datapath for Red Hat\nEnterprise Linux 7. \n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nChannel to provide early releases to layered products - noarch, ppc64le, x86_64\n\n3. Description:\n\nOpen vSwitch provides standard network bridging functions and support for\nthe OpenFlow protocol for remote per-flow control of traffic. \n\nSecurity Fix(es):\n\n* openvswitch: Mishandle of group mods in\nlib/ofp-util.c:parse_group_prop_ntr_selection_method() allows for assertion\nfailure (CVE-2018-17204)\n\n* openvswitch: Error during bundle commit in\nofproto/ofproto.c:ofproto_rule_insert__() allows for crash (CVE-2018-17205)\n\n* openvswitch: Buffer over-read in lib/ofp-actions.c:decode_bundle()\n(CVE-2018-17206)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, and other related information, refer to the CVE page(s) listed in\nthe References section. \n\nBug Fix(es):\n\n* Previously, when the ovs-vswitchd service restarted, an error displayed\nwith many open files. With this update, the number of sockets opened by\novs-vswitchd is decreased. As a result, the described problem no longer\noccurs. (BZ#1526306)\n\n* Previously, when OpenvSwitch service was reloaded, the default flow was\nnot removed and it became part of the final flow table. With this update,\nthe default flow rule is no longer added after a service reload. As a\nresult, the described problem no longer occurs. (BZ#1626096)\n\nEnhancement(s):\n\n* With this update, the pmd-rxq-assign configuration has been added to Poll\nMode Drivers (PMDs) cores. This allows users to select a round-robin\nassignment. (BZ#1616001)\n\n* With this update the ovs-appctl connection-status command has been\nintroduced to the ovs-appctl utility. The command enables to monitor\nhypervisor (HV) south bound database (SBDB) connection status. Layered\nproducts can now check if the ovn-controller is properly connected to a\ncentral node. (BZ#1593804)\n\n* With this update, a support for the Dynamic Host Configuration Protocol\n(DHCP) option 252 has been added to Open Virtual Network (OVN) Native DHCP. \n(BZ#1641765)\n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1526306 - ovs-vswitchd service hangs with Error too many open files\n1580217 - [ovn]ipv6 load balancer for layer4 on logical router doesn\u0027t work\n1593804 - ovn-controller: report when was the most recent successful communication with central\n1609643 - Running/destroying testpmd in guest which enabling vIOMMU can cause host ovs-vswitchd[10869]: segfault\n1616001 - [RFE] Add option to OVS 2.9 for legacy RXQ assignment to cores\n1618488 - vhost-user backend crash on SET_MEM_TABLE request handling while port enabled\n1626096 - systemctl reload openvswitch includes default flow. \n1627711 - Backport \"net/mlx{4,5}: avoid stripping the glue library\" commits\n1632522 - CVE-2018-17204 openvswitch: Mishandle of group mods in lib/ofp-util.c:parse_group_prop_ntr_selection_method() allows for assertion failure\n1632525 - CVE-2018-17205 openvswitch: Error during bundle commit in ofproto/ofproto.c:ofproto_rule_insert__() allows for crash\n1632528 - CVE-2018-17206 openvswitch: Buffer over-read in lib/ofp-actions.c:decode_bundle()\n1641765 - [RFE] Support DHCP Option 252 in OVN Native DHCP\n1643527 - Link OVS binaries statically\n\n6. Package List:\n\nChannel to provide early releases to layered products:\n\nSource:\nopenvswitch-2.9.0-70.el7fdp.1.src.rpm\n\nnoarch:\nopenvswitch-test-2.9.0-70.el7fdp.1.noarch.rpm\n\nppc64le:\nopenvswitch-2.9.0-70.el7fdp.1.ppc64le.rpm\nopenvswitch-debuginfo-2.9.0-70.el7fdp.1.ppc64le.rpm\nopenvswitch-devel-2.9.0-70.el7fdp.1.ppc64le.rpm\nopenvswitch-ovn-central-2.9.0-70.el7fdp.1.ppc64le.rpm\nopenvswitch-ovn-common-2.9.0-70.el7fdp.1.ppc64le.rpm\nopenvswitch-ovn-host-2.9.0-70.el7fdp.1.ppc64le.rpm\nopenvswitch-ovn-vtep-2.9.0-70.el7fdp.1.ppc64le.rpm\npython-openvswitch-2.9.0-70.el7fdp.1.ppc64le.rpm\n\nx86_64:\nopenvswitch-2.9.0-70.el7fdp.1.x86_64.rpm\nopenvswitch-debuginfo-2.9.0-70.el7fdp.1.x86_64.rpm\nopenvswitch-devel-2.9.0-70.el7fdp.1.x86_64.rpm\nopenvswitch-ovn-central-2.9.0-70.el7fdp.1.x86_64.rpm\nopenvswitch-ovn-common-2.9.0-70.el7fdp.1.x86_64.rpm\nopenvswitch-ovn-host-2.9.0-70.el7fdp.1.x86_64.rpm\nopenvswitch-ovn-vtep-2.9.0-70.el7fdp.1.x86_64.rpm\npython-openvswitch-2.9.0-70.el7fdp.1.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2018-17204\nhttps://access.redhat.com/security/cve/CVE-2018-17205\nhttps://access.redhat.com/security/cve/CVE-2018-17206\nhttps://access.redhat.com/security/updates/classification/#moderate\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2018 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\nCb3Z9eM3UQQ=\n=Cdfr\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. \n\nBug Fix(es):\n\n* Previously, the first packet of a new connection using an OVN logical\nrouter was used to discover the MAC address of the destination. This\nresulted in the loss of the first packet on the new connection. This\nenhancement adds the capability to correctly queue the first packet of a\nnew connection, which prevents the loss of that packet. (BZ#1600115)\n\n4. Bugs fixed (https://bugzilla.redhat.com/):\n\n1600115 - ping loss of first packet with OVN l3 logical router. ==========================================================================\nUbuntu Security Notice USN-3873-1\nJanuary 30, 2019\n\nopenvswitch vulnerabilities\n==========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 18.04 LTS\n- Ubuntu 16.04 LTS\n\nSummary:\n\nSeveral security issues were fixed in Open vSwitch. \n\nSoftware Description:\n- openvswitch: Ethernet virtual switch\n\nDetails:\n\nIt was discovered that Open vSwitch incorrectly decoded certain packets. A\nremote attacker could possibly use this issue to cause Open vSwitch to\ncrash, resulting in a denial of service. A remote attacker could possibly use this issue to cause Open\nvSwitch to crash, resulting in a denial of service. This issue only\naffected Ubuntu 18.04 LTS. (CVE-2018-17205)\n\nIt was discovered that Open vSwitch incorrectly handled BUNDLE action\ndecoding. A remote attacker could possibly use this issue to cause Open\nvSwitch to crash, resulting in a denial of service. (CVE-2018-17206)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 18.04 LTS:\n openvswitch-common 2.9.2-0ubuntu0.18.04.3\n\nUbuntu 16.04 LTS:\n openvswitch-common 2.5.5-0ubuntu0.16.04.2\n\nIn general, a standard system update will make all the necessary changes", "sources": [ { "db": "NVD", "id": "CVE-2018-17204" }, { "db": "JVNDB", "id": "JVNDB-2018-013985" }, { "db": "VULHUB", "id": "VHN-127640" }, { "db": "PACKETSTORM", "id": "151187" }, { "db": "PACKETSTORM", "id": "150175" }, { "db": "PACKETSTORM", "id": "151190" }, { "db": "PACKETSTORM", "id": "151402" } ], "trust": 2.07 }, "external_ids": { "_id": null, "data": [ { "db": "NVD", "id": "CVE-2018-17204", "trust": 2.9 }, { "db": "JVNDB", "id": "JVNDB-2018-013985", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201809-882", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2021.0639", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "151190", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "150175", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "151187", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "151402", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-127640", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-127640" }, { "db": "JVNDB", "id": "JVNDB-2018-013985" }, { "db": "PACKETSTORM", "id": "151187" }, { "db": "PACKETSTORM", "id": "150175" }, { "db": "PACKETSTORM", "id": "151190" }, { "db": "PACKETSTORM", "id": "151402" }, { "db": "CNNVD", "id": "CNNVD-201809-882" }, { "db": "NVD", "id": "CVE-2018-17204" } ] }, "id": "VAR-201809-0305", "iot": { "_id": null, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-127640" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T20:12:49.525000Z", "patch": { "_id": null, "data": [ { "title": "ofp-group: Don\u0027t assert-fail decoding bad OF1.5 group mod type or command", "trust": 0.8, "url": "https://github.com/openvswitch/ovs/commit/4af6da3b275b764b1afe194df6499b33d2bf4cde" }, { "title": "RHSA-2018:3500", "trust": 0.8, "url": "https://access.redhat.com/errata/RHSA-2018:3500" }, { "title": "RHSA-2019:0053", "trust": 0.8, "url": "https://access.redhat.com/errata/RHSA-2019:0053" }, { "title": "RHSA-2019:0081", "trust": 0.8, "url": "https://access.redhat.com/errata/RHSA-2019:0081" }, { "title": "Open vSwitch Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=85003" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-013985" }, { "db": "CNNVD", "id": "CNNVD-201809-882" } ] }, "problemtype_data": { "_id": null, "data": [ { "problemtype": "CWE-617", "trust": 1.1 }, { "problemtype": "CWE-20", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-127640" }, { "db": "JVNDB", "id": "JVNDB-2018-013985" }, { "db": "NVD", "id": "CVE-2018-17204" } ] }, "references": { "_id": null, "data": [ { "trust": 1.8, "url": "https://access.redhat.com/errata/rhsa-2018:3500" }, { "trust": 1.8, "url": "https://access.redhat.com/errata/rhsa-2019:0053" }, { "trust": 1.8, "url": "https://access.redhat.com/errata/rhsa-2019:0081" }, { "trust": 1.7, "url": "https://github.com/openvswitch/ovs/commit/4af6da3b275b764b1afe194df6499b33d2bf4cde" }, { "trust": 1.7, "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00032.html" }, { "trust": 1.7, "url": "https://usn.ubuntu.com/3873-1/" }, { "trust": 1.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-17204" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-17204" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.0639" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-17205" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-17206" }, { "trust": 0.3, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2018-17206" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2018-17205" }, { "trust": 0.3, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.3, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.3, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.3, "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2018-17204" }, { "trust": 0.3, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/openvswitch/2.9.2-0ubuntu0.18.04.3" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/usn/usn-3873-1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/openvswitch/2.5.5-0ubuntu0.16.04.2" } ], "sources": [ { "db": "VULHUB", "id": "VHN-127640" }, { "db": "JVNDB", "id": "JVNDB-2018-013985" }, { "db": "PACKETSTORM", "id": "151187" }, { "db": "PACKETSTORM", "id": "150175" }, { "db": "PACKETSTORM", "id": "151190" }, { "db": "PACKETSTORM", "id": "151402" }, { "db": "CNNVD", "id": "CNNVD-201809-882" }, { "db": "NVD", "id": "CVE-2018-17204" } ] }, "sources": { "_id": null, "data": [ { "db": "VULHUB", "id": "VHN-127640", "ident": null }, { "db": "JVNDB", "id": "JVNDB-2018-013985", "ident": null }, { "db": "PACKETSTORM", "id": "151187", "ident": null }, { "db": "PACKETSTORM", "id": "150175", "ident": null }, { "db": "PACKETSTORM", "id": "151190", "ident": null }, { "db": "PACKETSTORM", "id": "151402", "ident": null }, { "db": "CNNVD", "id": "CNNVD-201809-882", "ident": null }, { "db": "NVD", "id": "CVE-2018-17204", "ident": null } ] }, "sources_release_date": { "_id": null, "data": [ { "date": "2018-09-19T00:00:00", "db": "VULHUB", "id": "VHN-127640", "ident": null }, { "date": "2019-03-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-013985", "ident": null }, { "date": "2019-01-17T00:03:15", "db": "PACKETSTORM", "id": "151187", "ident": null }, { "date": "2018-11-05T21:01:31", "db": "PACKETSTORM", "id": "150175", "ident": null }, { "date": "2019-01-17T00:14:02", "db": "PACKETSTORM", "id": "151190", "ident": null }, { "date": "2019-01-30T16:11:42", "db": "PACKETSTORM", "id": "151402", "ident": null }, { "date": "2018-09-20T00:00:00", "db": "CNNVD", "id": "CNNVD-201809-882", "ident": null }, { "date": "2018-09-19T16:29:00.897000", "db": "NVD", "id": "CVE-2018-17204", "ident": null } ] }, "sources_update_date": { "_id": null, "data": [ { "date": "2020-10-15T00:00:00", "db": "VULHUB", "id": "VHN-127640", "ident": null }, { "date": "2019-03-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-013985", "ident": null }, { "date": "2021-02-22T00:00:00", "db": "CNNVD", "id": "CNNVD-201809-882", "ident": null }, { "date": "2024-11-21T03:54:05.327000", "db": "NVD", "id": "CVE-2018-17204", "ident": null } ] }, "threat_type": { "_id": null, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "151187" }, { "db": "PACKETSTORM", "id": "150175" }, { "db": "PACKETSTORM", "id": "151190" }, { "db": "PACKETSTORM", "id": "151402" }, { "db": "CNNVD", "id": "CNNVD-201809-882" } ], "trust": 1.0 }, "title": { "_id": null, "data": "Open vSwitch Input validation vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-013985" } ], "trust": 0.8 }, "type": { "_id": null, "data": "input validation", "sources": [ { "db": "CNNVD", "id": "CNNVD-201809-882" } ], "trust": 0.6 } }
ghsa-4wv2-475w-c2fw
Vulnerability from github
An issue was discovered in Open vSwitch (OvS) 2.7.x through 2.7.6, affecting parse_group_prop_ntr_selection_method in lib/ofp-util.c. When decoding a group mod, it validates the group type and command after the whole group mod has been decoded. The OF1.5 decoder, however, tries to use the type and command earlier, when it might still be invalid. This causes an assertion failure (via OVS_NOT_REACHED). ovs-vswitchd does not enable support for OpenFlow 1.5 by default.
{ "affected": [], "aliases": [ "CVE-2018-17204" ], "database_specific": { "cwe_ids": [ "CWE-617" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2018-09-19T16:29:00Z", "severity": "MODERATE" }, "details": "An issue was discovered in Open vSwitch (OvS) 2.7.x through 2.7.6, affecting parse_group_prop_ntr_selection_method in lib/ofp-util.c. When decoding a group mod, it validates the group type and command after the whole group mod has been decoded. The OF1.5 decoder, however, tries to use the type and command earlier, when it might still be invalid. This causes an assertion failure (via OVS_NOT_REACHED). ovs-vswitchd does not enable support for OpenFlow 1.5 by default.", "id": "GHSA-4wv2-475w-c2fw", "modified": "2022-05-13T01:07:36Z", "published": "2022-05-13T01:07:36Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-17204" }, { "type": "WEB", "url": "https://github.com/openvswitch/ovs/commit/4af6da3b275b764b1afe194df6499b33d2bf4cde" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:3500" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:0053" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:0081" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00032.html" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3873-1" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "type": "CVSS_V3" } ] }
gsd-2018-17204
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2018-17204", "description": "An issue was discovered in Open vSwitch (OvS) 2.7.x through 2.7.6, affecting parse_group_prop_ntr_selection_method in lib/ofp-util.c. When decoding a group mod, it validates the group type and command after the whole group mod has been decoded. The OF1.5 decoder, however, tries to use the type and command earlier, when it might still be invalid. This causes an assertion failure (via OVS_NOT_REACHED). ovs-vswitchd does not enable support for OpenFlow 1.5 by default.", "id": "GSD-2018-17204", "references": [ "https://www.suse.com/security/cve/CVE-2018-17204.html", "https://access.redhat.com/errata/RHSA-2019:0081", "https://access.redhat.com/errata/RHSA-2019:0053", "https://access.redhat.com/errata/RHBA-2018:3683", "https://access.redhat.com/errata/RHSA-2018:3500", "https://ubuntu.com/security/CVE-2018-17204" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2018-17204" ], "details": "An issue was discovered in Open vSwitch (OvS) 2.7.x through 2.7.6, affecting parse_group_prop_ntr_selection_method in lib/ofp-util.c. When decoding a group mod, it validates the group type and command after the whole group mod has been decoded. The OF1.5 decoder, however, tries to use the type and command earlier, when it might still be invalid. This causes an assertion failure (via OVS_NOT_REACHED). ovs-vswitchd does not enable support for OpenFlow 1.5 by default.", "id": "GSD-2018-17204", "modified": "2023-12-13T01:22:31.127758Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-17204", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Open vSwitch (OvS) 2.7.x through 2.7.6, affecting parse_group_prop_ntr_selection_method in lib/ofp-util.c. When decoding a group mod, it validates the group type and command after the whole group mod has been decoded. The OF1.5 decoder, however, tries to use the type and command earlier, when it might still be invalid. This causes an assertion failure (via OVS_NOT_REACHED). ovs-vswitchd does not enable support for OpenFlow 1.5 by default." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2019:0053", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:0053" }, { "name": "USN-3873-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3873-1/" }, { "name": "RHSA-2018:3500", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:3500" }, { "name": "https://github.com/openvswitch/ovs/commit/4af6da3b275b764b1afe194df6499b33d2bf4cde", "refsource": "MISC", "url": "https://github.com/openvswitch/ovs/commit/4af6da3b275b764b1afe194df6499b33d2bf4cde" }, { "name": "RHSA-2019:0081", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:0081" }, { "name": "[debian-lts-announce] 20210219 [SECURITY] [DLA 2571-1] openvswitch security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00032.html" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:openvswitch:openvswitch:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.7.6", "versionStartIncluding": "2.7.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:openstack:13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-17204" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "An issue was discovered in Open vSwitch (OvS) 2.7.x through 2.7.6, affecting parse_group_prop_ntr_selection_method in lib/ofp-util.c. When decoding a group mod, it validates the group type and command after the whole group mod has been decoded. The OF1.5 decoder, however, tries to use the type and command earlier, when it might still be invalid. This causes an assertion failure (via OVS_NOT_REACHED). ovs-vswitchd does not enable support for OpenFlow 1.5 by default." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-617" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/openvswitch/ovs/commit/4af6da3b275b764b1afe194df6499b33d2bf4cde", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/openvswitch/ovs/commit/4af6da3b275b764b1afe194df6499b33d2bf4cde" }, { "name": "RHSA-2018:3500", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:3500" }, { "name": "RHSA-2019:0081", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:0081" }, { "name": "RHSA-2019:0053", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:0053" }, { "name": "USN-3873-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3873-1/" }, { "name": "[debian-lts-announce] 20210219 [SECURITY] [DLA 2571-1] openvswitch security update", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00032.html" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4 } }, "lastModifiedDate": "2021-08-04T17:14Z", "publishedDate": "2018-09-19T16:29Z" } } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.