Action not permitted
Modal body text goes here.
CVE-2018-17206
Vulnerability from cvelistv5
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://access.redhat.com/errata/RHSA-2018:3500 | Third Party Advisory | |
cve@mitre.org | https://access.redhat.com/errata/RHSA-2019:0053 | Third Party Advisory | |
cve@mitre.org | https://access.redhat.com/errata/RHSA-2019:0081 | Third Party Advisory | |
cve@mitre.org | https://github.com/openvswitch/ovs/commit/9237a63c47bd314b807cda0bd2216264e82edbe8 | Patch, Third Party Advisory | |
cve@mitre.org | https://lists.debian.org/debian-lts-announce/2021/02/msg00032.html | Mailing List, Third Party Advisory | |
cve@mitre.org | https://usn.ubuntu.com/3873-1/ | Third Party Advisory |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T10:47:04.065Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2019:0053", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:0053" }, { "name": "USN-3873-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3873-1/" }, { "name": "RHSA-2018:3500", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:3500" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/openvswitch/ovs/commit/9237a63c47bd314b807cda0bd2216264e82edbe8" }, { "name": "RHSA-2019:0081", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:0081" }, { "name": "[debian-lts-announce] 20210219 [SECURITY] [DLA 2571-1] openvswitch security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00032.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-09-19T00:00:00", "descriptions": [ { "lang": "en", "value": "An issue was discovered in Open vSwitch (OvS) 2.7.x through 2.7.6. The decode_bundle function inside lib/ofp-actions.c is affected by a buffer over-read issue during BUNDLE action decoding." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-02-20T00:06:14", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "RHSA-2019:0053", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:0053" }, { "name": "USN-3873-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3873-1/" }, { "name": "RHSA-2018:3500", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:3500" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/openvswitch/ovs/commit/9237a63c47bd314b807cda0bd2216264e82edbe8" }, { "name": "RHSA-2019:0081", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:0081" }, { "name": "[debian-lts-announce] 20210219 [SECURITY] [DLA 2571-1] openvswitch security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00032.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-17206", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Open vSwitch (OvS) 2.7.x through 2.7.6. The decode_bundle function inside lib/ofp-actions.c is affected by a buffer over-read issue during BUNDLE action decoding." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2019:0053", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:0053" }, { "name": "USN-3873-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3873-1/" }, { "name": "RHSA-2018:3500", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:3500" }, { "name": "https://github.com/openvswitch/ovs/commit/9237a63c47bd314b807cda0bd2216264e82edbe8", "refsource": "MISC", "url": "https://github.com/openvswitch/ovs/commit/9237a63c47bd314b807cda0bd2216264e82edbe8" }, { "name": "RHSA-2019:0081", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:0081" }, { "name": "[debian-lts-announce] 20210219 [SECURITY] [DLA 2571-1] openvswitch security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00032.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-17206", "datePublished": "2018-09-19T16:00:00", "dateReserved": "2018-09-19T00:00:00", "dateUpdated": "2024-08-05T10:47:04.065Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2018-17206\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2018-09-19T16:29:01.113\",\"lastModified\":\"2021-08-04T17:14:46.777\",\"vulnStatus\":\"Analyzed\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"An issue was discovered in Open vSwitch (OvS) 2.7.x through 2.7.6. The decode_bundle function inside lib/ofp-actions.c is affected by a buffer over-read issue during BUNDLE action decoding.\"},{\"lang\":\"es\",\"value\":\"Se ha descubierto un problema en Open vSwitch, en versiones 2.7.x hasta la 2.7.6. La funci\u00f3n decode_bundle dentro de lib/ofp-actions.c se ve afectada por un problema de sobrelectura de b\u00fafer durante la decodificaci\u00f3n de la acci\u00f3n BUNDLE.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\",\"baseScore\":4.9,\"baseSeverity\":\"MEDIUM\"},\"exploitabilityScore\":1.2,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:N/I:N/A:P\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\",\"baseScore\":4.0},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-125\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openvswitch:openvswitch:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.7.0\",\"versionEndIncluding\":\"2.7.6\",\"matchCriteriaId\":\"682FD155-6A56-43D5-9953-852BB3AA0109\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E722FEF7-58A6-47AD-B1D0-DB0B71B0C7AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openstack:13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"704CFA1A-953E-4105-BFBE-406034B83DED\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]}],\"references\":[{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3500\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:0053\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:0081\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/openvswitch/ovs/commit/9237a63c47bd314b807cda0bd2216264e82edbe8\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/02/msg00032.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3873-1/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
gsd-2018-17206
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2018-17206", "description": "An issue was discovered in Open vSwitch (OvS) 2.7.x through 2.7.6. The decode_bundle function inside lib/ofp-actions.c is affected by a buffer over-read issue during BUNDLE action decoding.", "id": "GSD-2018-17206", "references": [ "https://www.suse.com/security/cve/CVE-2018-17206.html", "https://access.redhat.com/errata/RHSA-2019:0081", "https://access.redhat.com/errata/RHSA-2019:0053", "https://access.redhat.com/errata/RHSA-2018:3500", "https://ubuntu.com/security/CVE-2018-17206" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2018-17206" ], "details": "An issue was discovered in Open vSwitch (OvS) 2.7.x through 2.7.6. The decode_bundle function inside lib/ofp-actions.c is affected by a buffer over-read issue during BUNDLE action decoding.", "id": "GSD-2018-17206", "modified": "2023-12-13T01:22:31.125292Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-17206", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Open vSwitch (OvS) 2.7.x through 2.7.6. The decode_bundle function inside lib/ofp-actions.c is affected by a buffer over-read issue during BUNDLE action decoding." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2019:0053", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:0053" }, { "name": "USN-3873-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3873-1/" }, { "name": "RHSA-2018:3500", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:3500" }, { "name": "https://github.com/openvswitch/ovs/commit/9237a63c47bd314b807cda0bd2216264e82edbe8", "refsource": "MISC", "url": "https://github.com/openvswitch/ovs/commit/9237a63c47bd314b807cda0bd2216264e82edbe8" }, { "name": "RHSA-2019:0081", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:0081" }, { "name": "[debian-lts-announce] 20210219 [SECURITY] [DLA 2571-1] openvswitch security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00032.html" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:openvswitch:openvswitch:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.7.6", "versionStartIncluding": "2.7.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:openstack:13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-17206" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "An issue was discovered in Open vSwitch (OvS) 2.7.x through 2.7.6. The decode_bundle function inside lib/ofp-actions.c is affected by a buffer over-read issue during BUNDLE action decoding." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-125" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/openvswitch/ovs/commit/9237a63c47bd314b807cda0bd2216264e82edbe8", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/openvswitch/ovs/commit/9237a63c47bd314b807cda0bd2216264e82edbe8" }, { "name": "RHSA-2018:3500", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:3500" }, { "name": "RHSA-2019:0081", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:0081" }, { "name": "RHSA-2019:0053", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:0053" }, { "name": "USN-3873-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3873-1/" }, { "name": "[debian-lts-announce] 20210219 [SECURITY] [DLA 2571-1] openvswitch security update", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00032.html" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 3.6 } }, "lastModifiedDate": "2021-08-04T17:14Z", "publishedDate": "2018-09-19T16:29Z" } } }
var-201809-0317
Vulnerability from variot
An issue was discovered in Open vSwitch (OvS) 2.7.x through 2.7.6. The decode_bundle function inside lib/ofp-actions.c is affected by a buffer over-read issue during BUNDLE action decoding. Open vSwitch (OvS) Contains an out-of-bounds vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Open vSwitch is prone to a remote denial-of-service vulnerability. Attackers can exploit this issue to crash the affected application, denying service to legitimate users. Open vSwitch 2.5.x through 2.5.5, 2.6.x through 2.6.3, 2.7.x through 2.7.6, 2.8.x through 2.8.4, and 2.9.x through 2.9.2 are vulnerable. Open vSwitch (OvS) is a multi-layer virtual switch product based on open source technology (according to the Apache2.0 license). It supports large-scale network automation, standard management interfaces and protocols, etc. through programming extensions. The 'decode_bundle' function of the lib/ofp-actions.c file in OvS 2.7.x to 2.7.6 has a buffer out-of-bounds read vulnerability. Currently there is no information about this vulnerability, please keep an eye on CNNVD or vendor announcements. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
===================================================================== Red Hat Security Advisory
Synopsis: Moderate: openvswitch security, bug fix, and enhancement update Advisory ID: RHSA-2018:3500-01 Product: Fast Datapath Advisory URL: https://access.redhat.com/errata/RHSA-2018:3500 Issue date: 2018-11-05 CVE Names: CVE-2018-17204 CVE-2018-17205 CVE-2018-17206 =====================================================================
- Summary:
An update for openvswitch is now available for Fast Datapath for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Relevant releases/architectures:
Channel to provide early releases to layered products - noarch, ppc64le, x86_64
- Description:
Open vSwitch provides standard network bridging functions and support for the OpenFlow protocol for remote per-flow control of traffic.
Security Fix(es):
-
openvswitch: Mishandle of group mods in lib/ofp-util.c:parse_group_prop_ntr_selection_method() allows for assertion failure (CVE-2018-17204)
-
openvswitch: Error during bundle commit in ofproto/ofproto.c:ofproto_rule_insert__() allows for crash (CVE-2018-17205)
-
openvswitch: Buffer over-read in lib/ofp-actions.c:decode_bundle() (CVE-2018-17206)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
-
Previously, when the ovs-vswitchd service restarted, an error displayed with many open files. With this update, the number of sockets opened by ovs-vswitchd is decreased. As a result, the described problem no longer occurs. (BZ#1526306)
-
Previously, when OpenvSwitch service was reloaded, the default flow was not removed and it became part of the final flow table. With this update, the default flow rule is no longer added after a service reload. As a result, the described problem no longer occurs. (BZ#1626096)
Enhancement(s):
-
With this update, the pmd-rxq-assign configuration has been added to Poll Mode Drivers (PMDs) cores. This allows users to select a round-robin assignment. (BZ#1616001)
-
With this update the ovs-appctl connection-status command has been introduced to the ovs-appctl utility. The command enables to monitor hypervisor (HV) south bound database (SBDB) connection status. Layered products can now check if the ovn-controller is properly connected to a central node. (BZ#1593804)
-
With this update, a support for the Dynamic Host Configuration Protocol (DHCP) option 252 has been added to Open Virtual Network (OVN) Native DHCP. (BZ#1641765)
-
Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
- Bugs fixed (https://bugzilla.redhat.com/):
1526306 - ovs-vswitchd service hangs with Error too many open files 1580217 - [ovn]ipv6 load balancer for layer4 on logical router doesn't work 1593804 - ovn-controller: report when was the most recent successful communication with central 1609643 - Running/destroying testpmd in guest which enabling vIOMMU can cause host ovs-vswitchd[10869]: segfault 1616001 - [RFE] Add option to OVS 2.9 for legacy RXQ assignment to cores 1618488 - vhost-user backend crash on SET_MEM_TABLE request handling while port enabled 1626096 - systemctl reload openvswitch includes default flow. 1627711 - Backport "net/mlx{4,5}: avoid stripping the glue library" commits 1632522 - CVE-2018-17204 openvswitch: Mishandle of group mods in lib/ofp-util.c:parse_group_prop_ntr_selection_method() allows for assertion failure 1632525 - CVE-2018-17205 openvswitch: Error during bundle commit in ofproto/ofproto.c:ofproto_rule_insert__() allows for crash 1632528 - CVE-2018-17206 openvswitch: Buffer over-read in lib/ofp-actions.c:decode_bundle() 1641765 - [RFE] Support DHCP Option 252 in OVN Native DHCP 1643527 - Link OVS binaries statically
- Package List:
Channel to provide early releases to layered products:
Source: openvswitch-2.9.0-70.el7fdp.1.src.rpm
noarch: openvswitch-test-2.9.0-70.el7fdp.1.noarch.rpm
ppc64le: openvswitch-2.9.0-70.el7fdp.1.ppc64le.rpm openvswitch-debuginfo-2.9.0-70.el7fdp.1.ppc64le.rpm openvswitch-devel-2.9.0-70.el7fdp.1.ppc64le.rpm openvswitch-ovn-central-2.9.0-70.el7fdp.1.ppc64le.rpm openvswitch-ovn-common-2.9.0-70.el7fdp.1.ppc64le.rpm openvswitch-ovn-host-2.9.0-70.el7fdp.1.ppc64le.rpm openvswitch-ovn-vtep-2.9.0-70.el7fdp.1.ppc64le.rpm python-openvswitch-2.9.0-70.el7fdp.1.ppc64le.rpm
x86_64: openvswitch-2.9.0-70.el7fdp.1.x86_64.rpm openvswitch-debuginfo-2.9.0-70.el7fdp.1.x86_64.rpm openvswitch-devel-2.9.0-70.el7fdp.1.x86_64.rpm openvswitch-ovn-central-2.9.0-70.el7fdp.1.x86_64.rpm openvswitch-ovn-common-2.9.0-70.el7fdp.1.x86_64.rpm openvswitch-ovn-host-2.9.0-70.el7fdp.1.x86_64.rpm openvswitch-ovn-vtep-2.9.0-70.el7fdp.1.x86_64.rpm python-openvswitch-2.9.0-70.el7fdp.1.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2018-17204 https://access.redhat.com/security/cve/CVE-2018-17205 https://access.redhat.com/security/cve/CVE-2018-17206 https://access.redhat.com/security/updates/classification/#moderate
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2018 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIVAwUBW+BaCNzjgjWX9erEAQikXA/+OAaZIP3DWfdjyY8bMRbrRg9/VyGE3Go6 gS4wxrZh9yswHeG/RcTyfdWGceW/naWYC2fvPi+Vl8GRBoONNX76Z5bjkPx77/PF qUZpbNQG7aplbWkeuUIT1oWGDJ7Ax8Li0+zYBcr0MaOSiHJl5kOFsLYtYa/42WAg 9BgOeY+ZIJWrCNAFk6zGPGX/UejjZWuz/GJ7TL0V+W0XwvlPDZ4RCsmaCEBpYKrH R0SUmjl/fk3QCaMo77DfZeRLRPmFFNVYvIbx6OpZM/fA2neCpyBF6IkJF2KQbGoK JOTm85/ExVa2J6SO6LM6f/ZRhXciVZLPAYLvG/L/I4CWyyji8WEveNz+M3iHTooS hmqRw8msNBBogEQzke9KHVzuqQR14HhWs/lpeVI9KSh6fmkRnCpr3J764nNQhtHm f+ONma/8R0eqLsSSKoohQMrWy7WSAudDI9NriQwMAy0YqkRjCGZUOUR3A6jkaBFO MK6uaN1IhRG3h3JiNMuR5f4hVRaIPyGE7ltlbPzMyUcBBuWkk/Su/HOI2SitWO/Q fWQ00dttwLjtK73KiHHsskbFRLLE67DR+3AOQyC4lk9RLKN82kbfx8APly2Jr7Ec B9Q3AUpMArCK1kZy3VsWSNO48ECWpXPo2z7ZNZfF3veXDntYSF19ZkADstzYu2+Q Cb3Z9eM3UQQ= =Cdfr -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce .
Bug Fix(es):
-
Previously, the first packet of a new connection using an OVN logical router was used to discover the MAC address of the destination. This resulted in the loss of the first packet on the new connection. This enhancement adds the capability to correctly queue the first packet of a new connection, which prevents the loss of that packet. (BZ#1600115)
-
Bugs fixed (https://bugzilla.redhat.com/):
1600115 - ping loss of first packet with OVN l3 logical router. ========================================================================== Ubuntu Security Notice USN-3873-1 January 30, 2019
openvswitch vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
Summary:
Several security issues were fixed in Open vSwitch.
Software Description: - openvswitch: Ethernet virtual switch
Details:
It was discovered that Open vSwitch incorrectly decoded certain packets. (CVE-2018-17204)
It was discovered that Open vSwitch incorrectly handled processing certain flows. This issue only affected Ubuntu 18.04 LTS. (CVE-2018-17206)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 18.04 LTS: openvswitch-common 2.9.2-0ubuntu0.18.04.3
Ubuntu 16.04 LTS: openvswitch-common 2.5.5-0ubuntu0.16.04.2
In general, a standard system update will make all the necessary changes
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201809-0317", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "18.04" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "16.04" }, { "model": "openvswitch", "scope": "gte", "trust": 1.0, "vendor": "openvswitch", "version": "2.7.0" }, { "model": "openstack", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "13" }, { "model": "openstack", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "10" }, { "model": "openvswitch", "scope": "lte", "trust": 1.0, "vendor": "openvswitch", "version": "2.7.6" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "9.0" }, { "model": "ubuntu", "scope": null, "trust": 0.8, "vendor": "canonical", "version": null }, { "model": "open vswitch", "scope": "eq", "trust": 0.8, "vendor": "open vswitch", "version": "2.7.6 for up to 2.7.x" }, { "model": "openstack", "scope": null, "trust": 0.8, "vendor": "red hat", "version": null }, { "model": "virtualization", "scope": null, "trust": 0.8, "vendor": "red hat", "version": null }, { "model": "virtualization manager", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4.2" }, { "model": "virtualization for ibm power le", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "virtualization", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "openstack platform", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "9.0" }, { "model": "openstack platform", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "8.0" }, { "model": "openstack platform", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "13" }, { "model": "openstack platform", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "12" }, { "model": "openstack platform", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "10" }, { "model": "openstack for ibm power", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "13" }, { "model": "openstack director for rhel", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "9.070" }, { "model": "openstack director for rhel", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "8.070" }, { "model": "enterprise linux fast datapath", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "openvswitch", "scope": "eq", "trust": 0.3, "vendor": "openvswitch", "version": "2.9.2" }, { "model": "openvswitch", "scope": "eq", "trust": 0.3, "vendor": "openvswitch", "version": "2.9" }, { "model": "openvswitch", "scope": "eq", "trust": 0.3, "vendor": "openvswitch", "version": "2.8.4" }, { "model": "openvswitch", "scope": "eq", "trust": 0.3, "vendor": "openvswitch", "version": "2.8" }, { "model": "openvswitch", "scope": "eq", "trust": 0.3, "vendor": "openvswitch", "version": "2.7.6" }, { "model": "openvswitch", "scope": "eq", "trust": 0.3, "vendor": "openvswitch", "version": "2.7" }, { "model": "openvswitch", "scope": "eq", "trust": 0.3, "vendor": "openvswitch", "version": "2.6.3" }, { "model": "openvswitch", "scope": "eq", "trust": 0.3, "vendor": "openvswitch", "version": "2.6" }, { "model": "openvswitch", "scope": "eq", "trust": 0.3, "vendor": "openvswitch", "version": "2.5.5" }, { "model": "openvswitch", "scope": "eq", "trust": 0.3, "vendor": "openvswitch", "version": "2.5" } ], "sources": [ { "db": "BID", "id": "106675" }, { "db": "JVNDB", "id": "JVNDB-2018-013987" }, { "db": "NVD", "id": "CVE-2018-17206" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:openvswitch:openvswitch:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.7.6", "versionStartIncluding": "2.7.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:openstack:13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2018-17206" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "ClusterFuzz-External", "sources": [ { "db": "BID", "id": "106675" } ], "trust": 0.3 }, "cve": "CVE-2018-17206", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "exploitabilityScore": 8.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "Single", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 4.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2018-17206", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "exploitabilityScore": 8.0, "id": "VHN-127642", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:S/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.2, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 4.9, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2018-17206", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2018-17206", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201809-880", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-127642", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-127642" }, { "db": "JVNDB", "id": "JVNDB-2018-013987" }, { "db": "NVD", "id": "CVE-2018-17206" }, { "db": "CNNVD", "id": "CNNVD-201809-880" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An issue was discovered in Open vSwitch (OvS) 2.7.x through 2.7.6. The decode_bundle function inside lib/ofp-actions.c is affected by a buffer over-read issue during BUNDLE action decoding. Open vSwitch (OvS) Contains an out-of-bounds vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Open vSwitch is prone to a remote denial-of-service vulnerability. \nAttackers can exploit this issue to crash the affected application, denying service to legitimate users. \nOpen vSwitch 2.5.x through 2.5.5, 2.6.x through 2.6.3, 2.7.x through 2.7.6, 2.8.x through 2.8.4, and 2.9.x through 2.9.2 are vulnerable. Open vSwitch (OvS) is a multi-layer virtual switch product based on open source technology (according to the Apache2.0 license). It supports large-scale network automation, standard management interfaces and protocols, etc. through programming extensions. The \u0027decode_bundle\u0027 function of the lib/ofp-actions.c file in OvS 2.7.x to 2.7.6 has a buffer out-of-bounds read vulnerability. Currently there is no information about this vulnerability, please keep an eye on CNNVD or vendor announcements. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Moderate: openvswitch security, bug fix, and enhancement update\nAdvisory ID: RHSA-2018:3500-01\nProduct: Fast Datapath\nAdvisory URL: https://access.redhat.com/errata/RHSA-2018:3500\nIssue date: 2018-11-05\nCVE Names: CVE-2018-17204 CVE-2018-17205 CVE-2018-17206 \n=====================================================================\n\n1. Summary:\n\nAn update for openvswitch is now available for Fast Datapath for Red Hat\nEnterprise Linux 7. \n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nChannel to provide early releases to layered products - noarch, ppc64le, x86_64\n\n3. Description:\n\nOpen vSwitch provides standard network bridging functions and support for\nthe OpenFlow protocol for remote per-flow control of traffic. \n\nSecurity Fix(es):\n\n* openvswitch: Mishandle of group mods in\nlib/ofp-util.c:parse_group_prop_ntr_selection_method() allows for assertion\nfailure (CVE-2018-17204)\n\n* openvswitch: Error during bundle commit in\nofproto/ofproto.c:ofproto_rule_insert__() allows for crash (CVE-2018-17205)\n\n* openvswitch: Buffer over-read in lib/ofp-actions.c:decode_bundle()\n(CVE-2018-17206)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, and other related information, refer to the CVE page(s) listed in\nthe References section. \n\nBug Fix(es):\n\n* Previously, when the ovs-vswitchd service restarted, an error displayed\nwith many open files. With this update, the number of sockets opened by\novs-vswitchd is decreased. As a result, the described problem no longer\noccurs. (BZ#1526306)\n\n* Previously, when OpenvSwitch service was reloaded, the default flow was\nnot removed and it became part of the final flow table. With this update,\nthe default flow rule is no longer added after a service reload. As a\nresult, the described problem no longer occurs. (BZ#1626096)\n\nEnhancement(s):\n\n* With this update, the pmd-rxq-assign configuration has been added to Poll\nMode Drivers (PMDs) cores. This allows users to select a round-robin\nassignment. (BZ#1616001)\n\n* With this update the ovs-appctl connection-status command has been\nintroduced to the ovs-appctl utility. The command enables to monitor\nhypervisor (HV) south bound database (SBDB) connection status. Layered\nproducts can now check if the ovn-controller is properly connected to a\ncentral node. (BZ#1593804)\n\n* With this update, a support for the Dynamic Host Configuration Protocol\n(DHCP) option 252 has been added to Open Virtual Network (OVN) Native DHCP. \n(BZ#1641765)\n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1526306 - ovs-vswitchd service hangs with Error too many open files\n1580217 - [ovn]ipv6 load balancer for layer4 on logical router doesn\u0027t work\n1593804 - ovn-controller: report when was the most recent successful communication with central\n1609643 - Running/destroying testpmd in guest which enabling vIOMMU can cause host ovs-vswitchd[10869]: segfault\n1616001 - [RFE] Add option to OVS 2.9 for legacy RXQ assignment to cores\n1618488 - vhost-user backend crash on SET_MEM_TABLE request handling while port enabled\n1626096 - systemctl reload openvswitch includes default flow. \n1627711 - Backport \"net/mlx{4,5}: avoid stripping the glue library\" commits\n1632522 - CVE-2018-17204 openvswitch: Mishandle of group mods in lib/ofp-util.c:parse_group_prop_ntr_selection_method() allows for assertion failure\n1632525 - CVE-2018-17205 openvswitch: Error during bundle commit in ofproto/ofproto.c:ofproto_rule_insert__() allows for crash\n1632528 - CVE-2018-17206 openvswitch: Buffer over-read in lib/ofp-actions.c:decode_bundle()\n1641765 - [RFE] Support DHCP Option 252 in OVN Native DHCP\n1643527 - Link OVS binaries statically\n\n6. Package List:\n\nChannel to provide early releases to layered products:\n\nSource:\nopenvswitch-2.9.0-70.el7fdp.1.src.rpm\n\nnoarch:\nopenvswitch-test-2.9.0-70.el7fdp.1.noarch.rpm\n\nppc64le:\nopenvswitch-2.9.0-70.el7fdp.1.ppc64le.rpm\nopenvswitch-debuginfo-2.9.0-70.el7fdp.1.ppc64le.rpm\nopenvswitch-devel-2.9.0-70.el7fdp.1.ppc64le.rpm\nopenvswitch-ovn-central-2.9.0-70.el7fdp.1.ppc64le.rpm\nopenvswitch-ovn-common-2.9.0-70.el7fdp.1.ppc64le.rpm\nopenvswitch-ovn-host-2.9.0-70.el7fdp.1.ppc64le.rpm\nopenvswitch-ovn-vtep-2.9.0-70.el7fdp.1.ppc64le.rpm\npython-openvswitch-2.9.0-70.el7fdp.1.ppc64le.rpm\n\nx86_64:\nopenvswitch-2.9.0-70.el7fdp.1.x86_64.rpm\nopenvswitch-debuginfo-2.9.0-70.el7fdp.1.x86_64.rpm\nopenvswitch-devel-2.9.0-70.el7fdp.1.x86_64.rpm\nopenvswitch-ovn-central-2.9.0-70.el7fdp.1.x86_64.rpm\nopenvswitch-ovn-common-2.9.0-70.el7fdp.1.x86_64.rpm\nopenvswitch-ovn-host-2.9.0-70.el7fdp.1.x86_64.rpm\nopenvswitch-ovn-vtep-2.9.0-70.el7fdp.1.x86_64.rpm\npython-openvswitch-2.9.0-70.el7fdp.1.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2018-17204\nhttps://access.redhat.com/security/cve/CVE-2018-17205\nhttps://access.redhat.com/security/cve/CVE-2018-17206\nhttps://access.redhat.com/security/updates/classification/#moderate\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2018 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\nCb3Z9eM3UQQ=\n=Cdfr\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. \n\nBug Fix(es):\n\n* Previously, the first packet of a new connection using an OVN logical\nrouter was used to discover the MAC address of the destination. This\nresulted in the loss of the first packet on the new connection. This\nenhancement adds the capability to correctly queue the first packet of a\nnew connection, which prevents the loss of that packet. (BZ#1600115)\n\n4. Bugs fixed (https://bugzilla.redhat.com/):\n\n1600115 - ping loss of first packet with OVN l3 logical router. ==========================================================================\nUbuntu Security Notice USN-3873-1\nJanuary 30, 2019\n\nopenvswitch vulnerabilities\n==========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 18.04 LTS\n- Ubuntu 16.04 LTS\n\nSummary:\n\nSeveral security issues were fixed in Open vSwitch. \n\nSoftware Description:\n- openvswitch: Ethernet virtual switch\n\nDetails:\n\nIt was discovered that Open vSwitch incorrectly decoded certain packets. (CVE-2018-17204)\n\nIt was discovered that Open vSwitch incorrectly handled processing certain\nflows. This issue only\naffected Ubuntu 18.04 LTS. (CVE-2018-17206)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 18.04 LTS:\n openvswitch-common 2.9.2-0ubuntu0.18.04.3\n\nUbuntu 16.04 LTS:\n openvswitch-common 2.5.5-0ubuntu0.16.04.2\n\nIn general, a standard system update will make all the necessary changes", "sources": [ { "db": "NVD", "id": "CVE-2018-17206" }, { "db": "JVNDB", "id": "JVNDB-2018-013987" }, { "db": "BID", "id": "106675" }, { "db": "VULHUB", "id": "VHN-127642" }, { "db": "PACKETSTORM", "id": "151187" }, { "db": "PACKETSTORM", "id": "150175" }, { "db": "PACKETSTORM", "id": "151190" }, { "db": "PACKETSTORM", "id": "151402" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-17206", "trust": 3.2 }, { "db": "JVNDB", "id": "JVNDB-2018-013987", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201809-880", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2021.0639", "trust": 0.6 }, { "db": "BID", "id": "106675", "trust": 0.3 }, { "db": "VULHUB", "id": "VHN-127642", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "151187", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "150175", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "151190", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "151402", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-127642" }, { "db": "BID", "id": "106675" }, { "db": "JVNDB", "id": "JVNDB-2018-013987" }, { "db": "PACKETSTORM", "id": "151187" }, { "db": "PACKETSTORM", "id": "150175" }, { "db": "PACKETSTORM", "id": "151190" }, { "db": "PACKETSTORM", "id": "151402" }, { "db": "NVD", "id": "CVE-2018-17206" }, { "db": "CNNVD", "id": "CNNVD-201809-880" } ] }, "id": "VAR-201809-0317", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-127642" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T11:18:18.666000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "ofp-actions: Avoid buffer overread in BUNDLE action decoding", "trust": 0.8, "url": "https://github.com/openvswitch/ovs/commit/9237a63c47bd314b807cda0bd2216264e82edbe8" }, { "title": "Bug 1632528", "trust": 0.8, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1632528" }, { "title": "RHSA-2018:3500", "trust": 0.8, "url": "https://access.redhat.com/errata/rhsa-2018:3500" }, { "title": "RHSA-2019:0053", "trust": 0.8, "url": "https://access.redhat.com/errata/rhsa-2019:0053" }, { "title": "RHSA-2019:0081", "trust": 0.8, "url": "https://access.redhat.com/errata/rhsa-2019:0081" }, { "title": "USN-3873-1", "trust": 0.8, "url": "https://usn.ubuntu.com/3873-1/" }, { "title": "Open vSwitch Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=85001" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-013987" }, { "db": "CNNVD", "id": "CNNVD-201809-880" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-127642" }, { "db": "JVNDB", "id": "JVNDB-2018-013987" }, { "db": "NVD", "id": "CVE-2018-17206" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.1, "url": "https://access.redhat.com/errata/rhsa-2018:3500" }, { "trust": 2.1, "url": "https://access.redhat.com/errata/rhsa-2019:0053" }, { "trust": 2.1, "url": "https://access.redhat.com/errata/rhsa-2019:0081" }, { "trust": 2.0, "url": "https://github.com/openvswitch/ovs/commit/9237a63c47bd314b807cda0bd2216264e82edbe8" }, { "trust": 1.7, "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00032.html" }, { "trust": 1.7, "url": "https://usn.ubuntu.com/3873-1/" }, { "trust": 1.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-17206" }, { "trust": 0.9, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1632528" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-17206" }, { "trust": 0.6, "url": "https://access.redhat.com/security/cve/cve-2018-17206" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.0639" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-17205" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-17204" }, { "trust": 0.3, "url": "http://openvswitch.org/" }, { "trust": 0.3, "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=9052" }, { "trust": 0.3, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2018-17205" }, { "trust": 0.3, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.3, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.3, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.3, "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2018-17204" }, { "trust": 0.3, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/openvswitch/2.9.2-0ubuntu0.18.04.3" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/usn/usn-3873-1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/openvswitch/2.5.5-0ubuntu0.16.04.2" } ], "sources": [ { "db": "VULHUB", "id": "VHN-127642" }, { "db": "BID", "id": "106675" }, { "db": "JVNDB", "id": "JVNDB-2018-013987" }, { "db": "PACKETSTORM", "id": "151187" }, { "db": "PACKETSTORM", "id": "150175" }, { "db": "PACKETSTORM", "id": "151190" }, { "db": "PACKETSTORM", "id": "151402" }, { "db": "NVD", "id": "CVE-2018-17206" }, { "db": "CNNVD", "id": "CNNVD-201809-880" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-127642" }, { "db": "BID", "id": "106675" }, { "db": "JVNDB", "id": "JVNDB-2018-013987" }, { "db": "PACKETSTORM", "id": "151187" }, { "db": "PACKETSTORM", "id": "150175" }, { "db": "PACKETSTORM", "id": "151190" }, { "db": "PACKETSTORM", "id": "151402" }, { "db": "NVD", "id": "CVE-2018-17206" }, { "db": "CNNVD", "id": "CNNVD-201809-880" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-09-19T00:00:00", "db": "VULHUB", "id": "VHN-127642" }, { "date": "2018-09-25T00:00:00", "db": "BID", "id": "106675" }, { "date": "2019-03-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-013987" }, { "date": "2019-01-17T00:03:15", "db": "PACKETSTORM", "id": "151187" }, { "date": "2018-11-05T21:01:31", "db": "PACKETSTORM", "id": "150175" }, { "date": "2019-01-17T00:14:02", "db": "PACKETSTORM", "id": "151190" }, { "date": "2019-01-30T16:11:42", "db": "PACKETSTORM", "id": "151402" }, { "date": "2018-09-19T16:29:01.113000", "db": "NVD", "id": "CVE-2018-17206" }, { "date": "2018-09-20T00:00:00", "db": "CNNVD", "id": "CNNVD-201809-880" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-10-15T00:00:00", "db": "VULHUB", "id": "VHN-127642" }, { "date": "2018-09-25T00:00:00", "db": "BID", "id": "106675" }, { "date": "2019-03-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-013987" }, { "date": "2021-08-04T17:14:46.777000", "db": "NVD", "id": "CVE-2018-17206" }, { "date": "2021-02-22T00:00:00", "db": "CNNVD", "id": "CNNVD-201809-880" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "151187" }, { "db": "PACKETSTORM", "id": "150175" }, { "db": "PACKETSTORM", "id": "151190" }, { "db": "PACKETSTORM", "id": "151402" }, { "db": "CNNVD", "id": "CNNVD-201809-880" } ], "trust": 1.0 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Open vSwitch Vulnerable to out-of-bounds reading", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-013987" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201809-880" } ], "trust": 0.6 } }
rhsa-2019_0053
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for openvswitch is now available for Red Hat OpenStack Platform 10.0 (Newton).\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Open vSwitch provides standard network bridging functions and support for the OpenFlow protocol for remote per-flow control of traffic.\n\nSecurity Fix(es):\n\n* openvswitch: Mishandle of group mods in lib/ofp-util.c:parse_group_prop_ntr_selection_method() allows for assertion failure (CVE-2018-17204)\n\n* openvswitch: Error during bundle commit in ofproto/ofproto.c:ofproto_rule_insert__() allows for crash (CVE-2018-17205)\n\n* openvswitch: Buffer over-read in lib/ofp-actions.c:decode_bundle() (CVE-2018-17206)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:0053", "url": "https://access.redhat.com/errata/RHSA-2019:0053" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1632522", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1632522" }, { "category": "external", "summary": "1632525", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1632525" }, { "category": "external", "summary": "1632528", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1632528" }, { "category": "external", "summary": "1644383", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1644383" }, { "category": "external", "summary": "1651454", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1651454" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_0053.json" } ], "title": "Red Hat Security Advisory: openvswitch security and bug fix update", "tracking": { "current_release_date": "2024-11-15T00:39:32+00:00", "generator": { "date": "2024-11-15T00:39:32+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2019:0053", "initial_release_date": "2019-01-16T17:12:31+00:00", "revision_history": [ { "date": "2019-01-16T17:12:31+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-01-16T17:12:31+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T00:39:32+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "OpenStack 10.0 Tools for RHEL 7", "product": { "name": "OpenStack 10.0 Tools for RHEL 7", "product_id": "7Server-RH7-RHOS-DEVTOOLS-10.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:10::el7" } } }, { "category": "product_name", "name": "Red Hat OpenStack Platform 10.0", "product": { "name": "Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:10::el7" } } } ], "category": "product_family", "name": "Red Hat OpenStack Platform" }, { "branches": [ { "category": "product_version", "name": "openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "product": { "name": "openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "product_id": "openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch-ovn-vtep@2.9.0-83.el7fdp.1?arch=x86_64" } } }, { "category": "product_version", "name": "openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "product": { "name": "openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "product_id": "openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch-debuginfo@2.9.0-83.el7fdp.1?arch=x86_64" } } }, { "category": "product_version", "name": "python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "product": { "name": "python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "product_id": "python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-openvswitch@2.9.0-83.el7fdp.1?arch=x86_64" } } }, { "category": "product_version", "name": "openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "product": { "name": "openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "product_id": "openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch-ovn-common@2.9.0-83.el7fdp.1?arch=x86_64" } } }, { "category": "product_version", "name": "openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "product": { "name": "openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "product_id": "openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch-ovn-central@2.9.0-83.el7fdp.1?arch=x86_64" } } }, { "category": "product_version", "name": "openvswitch-devel-0:2.9.0-83.el7fdp.1.x86_64", "product": { "name": "openvswitch-devel-0:2.9.0-83.el7fdp.1.x86_64", "product_id": "openvswitch-devel-0:2.9.0-83.el7fdp.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch-devel@2.9.0-83.el7fdp.1?arch=x86_64" } } }, { "category": "product_version", "name": "openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "product": { "name": "openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "product_id": "openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch@2.9.0-83.el7fdp.1?arch=x86_64" } } }, { "category": "product_version", "name": "openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "product": { "name": "openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "product_id": "openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch-ovn-host@2.9.0-83.el7fdp.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openvswitch-0:2.9.0-83.el7fdp.1.src", "product": { "name": "openvswitch-0:2.9.0-83.el7fdp.1.src", "product_id": "openvswitch-0:2.9.0-83.el7fdp.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch@2.9.0-83.el7fdp.1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "product": { "name": "openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "product_id": "openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch-test@2.9.0-83.el7fdp.1?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openvswitch-0:2.9.0-83.el7fdp.1.src as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.src" }, "product_reference": "openvswitch-0:2.9.0-83.el7fdp.1.src", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-0:2.9.0-83.el7fdp.1.x86_64 as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64" }, "product_reference": "openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64 as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64" }, "product_reference": "openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-devel-0:2.9.0-83.el7fdp.1.x86_64 as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:openvswitch-devel-0:2.9.0-83.el7fdp.1.x86_64" }, "product_reference": "openvswitch-devel-0:2.9.0-83.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64 as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64" }, "product_reference": "openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64 as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64" }, "product_reference": "openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64 as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64" }, "product_reference": "openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64 as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64" }, "product_reference": "openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-test-0:2.9.0-83.el7fdp.1.noarch as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch" }, "product_reference": "openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64 as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64" }, "product_reference": "python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-0:2.9.0-83.el7fdp.1.src as a component of OpenStack 10.0 Tools for RHEL 7", "product_id": "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.src" }, "product_reference": "openvswitch-0:2.9.0-83.el7fdp.1.src", "relates_to_product_reference": "7Server-RH7-RHOS-DEVTOOLS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-0:2.9.0-83.el7fdp.1.x86_64 as a component of OpenStack 10.0 Tools for RHEL 7", "product_id": "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64" }, "product_reference": "openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-DEVTOOLS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64 as a component of OpenStack 10.0 Tools for RHEL 7", "product_id": "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64" }, "product_reference": "openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-DEVTOOLS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-devel-0:2.9.0-83.el7fdp.1.x86_64 as a component of OpenStack 10.0 Tools for RHEL 7", "product_id": "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-devel-0:2.9.0-83.el7fdp.1.x86_64" }, "product_reference": "openvswitch-devel-0:2.9.0-83.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-DEVTOOLS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64 as a component of OpenStack 10.0 Tools for RHEL 7", "product_id": "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64" }, "product_reference": "openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-DEVTOOLS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64 as a component of OpenStack 10.0 Tools for RHEL 7", "product_id": "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64" }, "product_reference": "openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-DEVTOOLS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64 as a component of OpenStack 10.0 Tools for RHEL 7", "product_id": "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64" }, "product_reference": "openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-DEVTOOLS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64 as a component of OpenStack 10.0 Tools for RHEL 7", "product_id": "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64" }, "product_reference": "openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-DEVTOOLS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-test-0:2.9.0-83.el7fdp.1.noarch as a component of OpenStack 10.0 Tools for RHEL 7", "product_id": "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch" }, "product_reference": "openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-DEVTOOLS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64 as a component of OpenStack 10.0 Tools for RHEL 7", "product_id": "7Server-RH7-RHOS-DEVTOOLS-10.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64" }, "product_reference": "python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-DEVTOOLS-10.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-17204", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2018-09-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1632522" } ], "notes": [ { "category": "description", "text": "An issue was discovered in Open vSwitch (OvS), 2.4.x through 2.4.1, 2.5.x through 2.5.5, 2.6.x through 2.6.3, 2.7.x through 2.7.6, 2.8.x through 2.8.4, and2.9.x through 2.9.2, affecting the parse_group_prop_ntr_selection_method in lib/ofp-util.c. On controllers with the OpenFlow 1.5 decoder enabled, a specially crafted group update can cause an assertion failure, potentially leading to a Denial of Service condition.", "title": "Vulnerability description" }, { "category": "summary", "text": "openvswitch: Mishandle of group mods in lib/ofp-util.c:parse_group_prop_ntr_selection_method() allows for assertion failure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.src", "7Server-RH7-RHOS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-devel-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "7Server-RH7-RHOS-10.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.src", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-devel-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "7Server-RH7-RHOS-DEVTOOLS-10.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-17204" }, { "category": "external", "summary": "RHBZ#1632522", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1632522" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-17204", "url": "https://www.cve.org/CVERecord?id=CVE-2018-17204" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-17204", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-17204" } ], "release_date": "2018-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-01-16T17:12:31+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.src", "7Server-RH7-RHOS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-devel-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "7Server-RH7-RHOS-10.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.src", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-devel-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "7Server-RH7-RHOS-DEVTOOLS-10.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:0053" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 2.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "7Server-RH7-RHOS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.src", "7Server-RH7-RHOS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-devel-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "7Server-RH7-RHOS-10.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.src", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-devel-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "7Server-RH7-RHOS-DEVTOOLS-10.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openvswitch: Mishandle of group mods in lib/ofp-util.c:parse_group_prop_ntr_selection_method() allows for assertion failure" }, { "cve": "CVE-2018-17205", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2018-09-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1632525" } ], "notes": [ { "category": "description", "text": "An issue was discovered in Open vSwitch (OvS), 2.7.x through 2.7.6, 2.8.x through 2.8.4, and 2.9.x through 2.9.2, where the ofproto_rule_insert__() function inside ofproto/ofproto.c is affected by an assertion failure under certain circumstances.\r\nA specially crafted flow update applied using the bundling feature of Open vSwitch could potentially cause the assertion failure, potentially leading to incorrect flow information being applied, or a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "openvswitch: Error during bundle commit in ofproto/ofproto.c:ofproto_rule_insert__() allows for crash", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.src", "7Server-RH7-RHOS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-devel-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "7Server-RH7-RHOS-10.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.src", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-devel-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "7Server-RH7-RHOS-DEVTOOLS-10.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-17205" }, { "category": "external", "summary": "RHBZ#1632525", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1632525" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-17205", "url": "https://www.cve.org/CVERecord?id=CVE-2018-17205" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-17205", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-17205" } ], "release_date": "2018-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-01-16T17:12:31+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.src", "7Server-RH7-RHOS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-devel-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "7Server-RH7-RHOS-10.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.src", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-devel-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "7Server-RH7-RHOS-DEVTOOLS-10.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:0053" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.src", "7Server-RH7-RHOS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-devel-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "7Server-RH7-RHOS-10.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.src", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-devel-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "7Server-RH7-RHOS-DEVTOOLS-10.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openvswitch: Error during bundle commit in ofproto/ofproto.c:ofproto_rule_insert__() allows for crash" }, { "cve": "CVE-2018-17206", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2018-09-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1632528" } ], "notes": [ { "category": "description", "text": "An issue was discovered in Open vSwitch (OvS) 2.5.x through 2.5.5, 2.6.x through 2.6.3, 2.7.x through 2.7.6, 2.8.x through 2.8.4, and 2.9.x through 2.9.2 where the decode_bundle function inside lib/ofp-actions.c is affected by a buffer over-read issue during BUNDLE action decoding.\r\nA specially crafted flow update applied using the bundling feature of Open vSwitch could potentially cause a crash leading to a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "openvswitch: Buffer over-read in lib/ofp-actions.c:decode_bundle()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.src", "7Server-RH7-RHOS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-devel-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "7Server-RH7-RHOS-10.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.src", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-devel-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "7Server-RH7-RHOS-DEVTOOLS-10.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-17206" }, { "category": "external", "summary": "RHBZ#1632528", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1632528" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-17206", "url": "https://www.cve.org/CVERecord?id=CVE-2018-17206" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-17206", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-17206" } ], "release_date": "2018-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-01-16T17:12:31+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.src", "7Server-RH7-RHOS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-devel-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "7Server-RH7-RHOS-10.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.src", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-devel-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "7Server-RH7-RHOS-DEVTOOLS-10.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:0053" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.src", "7Server-RH7-RHOS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-devel-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-10.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "7Server-RH7-RHOS-10.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.src", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-devel-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-10.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "7Server-RH7-RHOS-DEVTOOLS-10.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openvswitch: Buffer over-read in lib/ofp-actions.c:decode_bundle()" } ] }
rhsa-2019_0081
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for openvswitch is now available for Red Hat OpenStack Platform 13.0 (Queens).\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Open vSwitch provides standard network bridging functions and support for the OpenFlow protocol for remote per-flow control of traffic.\n\nSecurity Fix(es):\n\n* openvswitch: Mishandle of group mods in lib/ofp-util.c:parse_group_prop_ntr_selection_method() allows for assertion failure (CVE-2018-17204)\n\n* openvswitch: Error during bundle commit in ofproto/ofproto.c:ofproto_rule_insert__() allows for crash (CVE-2018-17205)\n\n* openvswitch: Buffer over-read in lib/ofp-actions.c:decode_bundle() (CVE-2018-17206)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Previously, the first packet of a new connection using an OVN logical router was used to discover the MAC address of the destination. This resulted in the loss of the first packet on the new connection. This \nenhancement adds the capability to correctly queue the first packet of a new connection, which prevents the loss of that packet. (BZ#1600115)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:0081", "url": "https://access.redhat.com/errata/RHSA-2019:0081" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1600115", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1600115" }, { "category": "external", "summary": "1632522", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1632522" }, { "category": "external", "summary": "1632525", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1632525" }, { "category": "external", "summary": "1632528", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1632528" }, { "category": "external", "summary": "1651453", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1651453" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_0081.json" } ], "title": "Red Hat Security Advisory: openvswitch security and bug fix update", "tracking": { "current_release_date": "2024-11-15T00:39:37+00:00", "generator": { "date": "2024-11-15T00:39:37+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2019:0081", "initial_release_date": "2019-01-16T17:53:06+00:00", "revision_history": [ { "date": "2019-01-16T17:53:06+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-01-16T17:53:06+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T00:39:37+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenStack Platform 13.0", "product": { "name": "Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-13.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:13::el7" } } }, { "category": "product_name", "name": "Red Hat OpenStack Platform 13.0", "product": { "name": "Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-DEVTOOLS-13.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:13::el7" } } } ], "category": "product_family", "name": "Red Hat OpenStack Platform" }, { "branches": [ { "category": "product_version", "name": "openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "product": { "name": "openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "product_id": "openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch-test@2.9.0-83.el7fdp.1?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "product": { "name": "openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "product_id": "openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch-ovn-vtep@2.9.0-83.el7fdp.1?arch=x86_64" } } }, { "category": "product_version", "name": "openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "product": { "name": "openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "product_id": "openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch-debuginfo@2.9.0-83.el7fdp.1?arch=x86_64" } } }, { "category": "product_version", "name": "python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "product": { "name": "python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "product_id": "python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-openvswitch@2.9.0-83.el7fdp.1?arch=x86_64" } } }, { "category": "product_version", "name": "openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "product": { "name": "openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "product_id": "openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch-ovn-common@2.9.0-83.el7fdp.1?arch=x86_64" } } }, { "category": "product_version", "name": "openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "product": { "name": "openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "product_id": "openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch-ovn-central@2.9.0-83.el7fdp.1?arch=x86_64" } } }, { "category": "product_version", "name": "openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "product": { "name": "openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "product_id": "openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch@2.9.0-83.el7fdp.1?arch=x86_64" } } }, { "category": "product_version", "name": "openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "product": { "name": "openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "product_id": "openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch-ovn-host@2.9.0-83.el7fdp.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.ppc64le", "product": { "name": "openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.ppc64le", "product_id": "openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch-ovn-vtep@2.9.0-83.el7fdp.1?arch=ppc64le" } } }, { "category": "product_version", "name": "openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.ppc64le", "product": { "name": "openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.ppc64le", "product_id": "openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch-debuginfo@2.9.0-83.el7fdp.1?arch=ppc64le" } } }, { "category": "product_version", "name": "python-openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "product": { "name": "python-openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "product_id": "python-openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-openvswitch@2.9.0-83.el7fdp.1?arch=ppc64le" } } }, { "category": "product_version", "name": "openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.ppc64le", "product": { "name": "openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.ppc64le", "product_id": "openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch-ovn-common@2.9.0-83.el7fdp.1?arch=ppc64le" } } }, { "category": "product_version", "name": "openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.ppc64le", "product": { "name": "openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.ppc64le", "product_id": "openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch-ovn-central@2.9.0-83.el7fdp.1?arch=ppc64le" } } }, { "category": "product_version", "name": "openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "product": { "name": "openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "product_id": "openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch@2.9.0-83.el7fdp.1?arch=ppc64le" } } }, { "category": "product_version", "name": "openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.ppc64le", "product": { "name": "openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.ppc64le", "product_id": "openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch-ovn-host@2.9.0-83.el7fdp.1?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "openvswitch-0:2.9.0-83.el7fdp.1.src", "product": { "name": "openvswitch-0:2.9.0-83.el7fdp.1.src", "product_id": "openvswitch-0:2.9.0-83.el7fdp.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch@2.9.0-83.el7fdp.1?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openvswitch-0:2.9.0-83.el7fdp.1.ppc64le as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.ppc64le" }, "product_reference": "openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-0:2.9.0-83.el7fdp.1.src as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.src" }, "product_reference": "openvswitch-0:2.9.0-83.el7fdp.1.src", "relates_to_product_reference": "7Server-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-0:2.9.0-83.el7fdp.1.x86_64 as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64" }, "product_reference": "openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.ppc64le as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.ppc64le" }, "product_reference": "openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64 as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64" }, "product_reference": "openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.ppc64le as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.ppc64le" }, "product_reference": "openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64 as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64" }, "product_reference": "openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.ppc64le as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.ppc64le" }, "product_reference": "openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64 as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64" }, "product_reference": "openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.ppc64le as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.ppc64le" }, "product_reference": "openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64 as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64" }, "product_reference": "openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.ppc64le as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.ppc64le" }, "product_reference": "openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64 as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64" }, "product_reference": "openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-test-0:2.9.0-83.el7fdp.1.noarch as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-13.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch" }, "product_reference": "openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "python-openvswitch-0:2.9.0-83.el7fdp.1.ppc64le as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.ppc64le" }, "product_reference": "python-openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64 as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64" }, "product_reference": "python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-0:2.9.0-83.el7fdp.1.ppc64le as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.ppc64le" }, "product_reference": "openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOS-DEVTOOLS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-0:2.9.0-83.el7fdp.1.src as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.src" }, "product_reference": "openvswitch-0:2.9.0-83.el7fdp.1.src", "relates_to_product_reference": "7Server-RH7-RHOS-DEVTOOLS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-0:2.9.0-83.el7fdp.1.x86_64 as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64" }, "product_reference": "openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-DEVTOOLS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.ppc64le as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.ppc64le" }, "product_reference": "openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOS-DEVTOOLS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64 as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64" }, "product_reference": "openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-DEVTOOLS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.ppc64le as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.ppc64le" }, "product_reference": "openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOS-DEVTOOLS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64 as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64" }, "product_reference": "openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-DEVTOOLS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.ppc64le as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.ppc64le" }, "product_reference": "openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOS-DEVTOOLS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64 as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64" }, "product_reference": "openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-DEVTOOLS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.ppc64le as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.ppc64le" }, "product_reference": "openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOS-DEVTOOLS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64 as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64" }, "product_reference": "openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-DEVTOOLS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.ppc64le as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.ppc64le" }, "product_reference": "openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOS-DEVTOOLS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64 as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64" }, "product_reference": "openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-DEVTOOLS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-test-0:2.9.0-83.el7fdp.1.noarch as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch" }, "product_reference": "openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-DEVTOOLS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "python-openvswitch-0:2.9.0-83.el7fdp.1.ppc64le as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-DEVTOOLS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.ppc64le" }, "product_reference": "python-openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "relates_to_product_reference": "7Server-RH7-RHOS-DEVTOOLS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64 as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-DEVTOOLS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64" }, "product_reference": "python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-RH7-RHOS-DEVTOOLS-13.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-17204", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2018-09-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1632522" } ], "notes": [ { "category": "description", "text": "An issue was discovered in Open vSwitch (OvS), 2.4.x through 2.4.1, 2.5.x through 2.5.5, 2.6.x through 2.6.3, 2.7.x through 2.7.6, 2.8.x through 2.8.4, and2.9.x through 2.9.2, affecting the parse_group_prop_ntr_selection_method in lib/ofp-util.c. On controllers with the OpenFlow 1.5 decoder enabled, a specially crafted group update can cause an assertion failure, potentially leading to a Denial of Service condition.", "title": "Vulnerability description" }, { "category": "summary", "text": "openvswitch: Mishandle of group mods in lib/ofp-util.c:parse_group_prop_ntr_selection_method() allows for assertion failure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.src", "7Server-RH7-RHOS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "7Server-RH7-RHOS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.src", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "7Server-RH7-RHOS-DEVTOOLS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-17204" }, { "category": "external", "summary": "RHBZ#1632522", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1632522" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-17204", "url": "https://www.cve.org/CVERecord?id=CVE-2018-17204" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-17204", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-17204" } ], "release_date": "2018-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-01-16T17:53:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.src", "7Server-RH7-RHOS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "7Server-RH7-RHOS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.src", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "7Server-RH7-RHOS-DEVTOOLS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:0081" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 2.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "7Server-RH7-RHOS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.src", "7Server-RH7-RHOS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "7Server-RH7-RHOS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.src", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "7Server-RH7-RHOS-DEVTOOLS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openvswitch: Mishandle of group mods in lib/ofp-util.c:parse_group_prop_ntr_selection_method() allows for assertion failure" }, { "cve": "CVE-2018-17205", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2018-09-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1632525" } ], "notes": [ { "category": "description", "text": "An issue was discovered in Open vSwitch (OvS), 2.7.x through 2.7.6, 2.8.x through 2.8.4, and 2.9.x through 2.9.2, where the ofproto_rule_insert__() function inside ofproto/ofproto.c is affected by an assertion failure under certain circumstances.\r\nA specially crafted flow update applied using the bundling feature of Open vSwitch could potentially cause the assertion failure, potentially leading to incorrect flow information being applied, or a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "openvswitch: Error during bundle commit in ofproto/ofproto.c:ofproto_rule_insert__() allows for crash", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.src", "7Server-RH7-RHOS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "7Server-RH7-RHOS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.src", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "7Server-RH7-RHOS-DEVTOOLS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-17205" }, { "category": "external", "summary": "RHBZ#1632525", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1632525" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-17205", "url": "https://www.cve.org/CVERecord?id=CVE-2018-17205" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-17205", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-17205" } ], "release_date": "2018-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-01-16T17:53:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.src", "7Server-RH7-RHOS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "7Server-RH7-RHOS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.src", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "7Server-RH7-RHOS-DEVTOOLS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:0081" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.src", "7Server-RH7-RHOS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "7Server-RH7-RHOS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.src", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "7Server-RH7-RHOS-DEVTOOLS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openvswitch: Error during bundle commit in ofproto/ofproto.c:ofproto_rule_insert__() allows for crash" }, { "cve": "CVE-2018-17206", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2018-09-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1632528" } ], "notes": [ { "category": "description", "text": "An issue was discovered in Open vSwitch (OvS) 2.5.x through 2.5.5, 2.6.x through 2.6.3, 2.7.x through 2.7.6, 2.8.x through 2.8.4, and 2.9.x through 2.9.2 where the decode_bundle function inside lib/ofp-actions.c is affected by a buffer over-read issue during BUNDLE action decoding.\r\nA specially crafted flow update applied using the bundling feature of Open vSwitch could potentially cause a crash leading to a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "openvswitch: Buffer over-read in lib/ofp-actions.c:decode_bundle()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.src", "7Server-RH7-RHOS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "7Server-RH7-RHOS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.src", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "7Server-RH7-RHOS-DEVTOOLS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-17206" }, { "category": "external", "summary": "RHBZ#1632528", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1632528" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-17206", "url": "https://www.cve.org/CVERecord?id=CVE-2018-17206" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-17206", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-17206" } ], "release_date": "2018-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-01-16T17:53:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.src", "7Server-RH7-RHOS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "7Server-RH7-RHOS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.src", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "7Server-RH7-RHOS-DEVTOOLS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:0081" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RH7-RHOS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.src", "7Server-RH7-RHOS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-13.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "7Server-RH7-RHOS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.src", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-debuginfo-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-central-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-common-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-host-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-ovn-vtep-0:2.9.0-83.el7fdp.1.x86_64", "7Server-RH7-RHOS-DEVTOOLS-13.0:openvswitch-test-0:2.9.0-83.el7fdp.1.noarch", "7Server-RH7-RHOS-DEVTOOLS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.ppc64le", "7Server-RH7-RHOS-DEVTOOLS-13.0:python-openvswitch-0:2.9.0-83.el7fdp.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openvswitch: Buffer over-read in lib/ofp-actions.c:decode_bundle()" } ] }
rhsa-2018_3500
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for openvswitch is now available for Fast Datapath for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Open vSwitch provides standard network bridging functions and support for the OpenFlow protocol for remote per-flow control of traffic.\n\nSecurity Fix(es):\n\n* openvswitch: Mishandle of group mods in lib/ofp-util.c:parse_group_prop_ntr_selection_method() allows for assertion failure (CVE-2018-17204)\n\n* openvswitch: Error during bundle commit in ofproto/ofproto.c:ofproto_rule_insert__() allows for crash (CVE-2018-17205)\n\n* openvswitch: Buffer over-read in lib/ofp-actions.c:decode_bundle() (CVE-2018-17206)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Previously, when the ovs-vswitchd service restarted, an error displayed with many open files. With this update, the number of sockets opened by ovs-vswitchd is decreased. As a result, the described problem no longer occurs. (BZ#1526306)\n\n* Previously, when OpenvSwitch service was reloaded, the default flow was not removed and it became part of the final flow table. With this update, the default flow rule is no longer added after a service reload. As a result, the described problem no longer occurs. (BZ#1626096)\n\nEnhancement(s):\n\n* With this update, the pmd-rxq-assign configuration has been added to Poll Mode Drivers (PMDs) cores. This allows users to select a round-robin assignment. (BZ#1616001)\n\n* With this update the ovs-appctl connection-status command has been introduced to the ovs-appctl utility. The command enables to monitor hypervisor (HV) south bound database (SBDB) connection status. Layered products can now check if the ovn-controller is properly connected to a central node. (BZ#1593804)\n\n* With this update, a support for the Dynamic Host Configuration Protocol (DHCP) option 252 has been added to Open Virtual Network (OVN) Native DHCP. (BZ#1641765)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:3500", "url": "https://access.redhat.com/errata/RHSA-2018:3500" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1526306", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1526306" }, { "category": "external", "summary": "1580217", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1580217" }, { "category": "external", "summary": "1593804", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1593804" }, { "category": "external", "summary": "1609643", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1609643" }, { "category": "external", "summary": "1616001", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616001" }, { "category": "external", "summary": "1618488", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618488" }, { "category": "external", "summary": "1626096", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1626096" }, { "category": "external", "summary": "1627711", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1627711" }, { "category": "external", "summary": "1632522", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1632522" }, { "category": "external", "summary": "1632525", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1632525" }, { "category": "external", "summary": "1632528", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1632528" }, { "category": "external", "summary": "1641765", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1641765" }, { "category": "external", "summary": "1643527", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1643527" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_3500.json" } ], "title": "Red Hat Security Advisory: openvswitch security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-11-15T00:37:10+00:00", "generator": { "date": "2024-11-15T00:37:10+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2018:3500", "initial_release_date": "2018-11-05T14:56:37+00:00", "revision_history": [ { "date": "2018-11-05T14:56:37+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-11-05T14:56:37+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T00:37:10+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Fast Datapath for Red Hat Enterprise Linux 7", "product": { "name": "Fast Datapath for Red Hat Enterprise Linux 7", "product_id": "7Server-RH7-Fast-Datapath", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::fastdatapath" } } }, { "category": "product_name", "name": "Red Hat Virtualization 4.2 Management Agent for RHEL 7.6 EUS Hosts", "product": { "name": "Red Hat Virtualization 4.2 Management Agent for RHEL 7.6 EUS Hosts", "product_id": "7Server-7.6.EUS-RHV-4.2-Agents-eus", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor" } } } ], "category": "product_family", "name": "Fast Datapath" }, { "branches": [ { "category": "product_version", "name": "openvswitch-0:2.9.0-70.el7fdp.1.x86_64", "product": { "name": "openvswitch-0:2.9.0-70.el7fdp.1.x86_64", "product_id": "openvswitch-0:2.9.0-70.el7fdp.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch@2.9.0-70.el7fdp.1?arch=x86_64" } } }, { "category": "product_version", "name": "openvswitch-devel-0:2.9.0-70.el7fdp.1.x86_64", "product": { "name": "openvswitch-devel-0:2.9.0-70.el7fdp.1.x86_64", "product_id": "openvswitch-devel-0:2.9.0-70.el7fdp.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch-devel@2.9.0-70.el7fdp.1?arch=x86_64" } } }, { "category": "product_version", "name": "openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.x86_64", "product": { "name": "openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.x86_64", "product_id": "openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch-ovn-central@2.9.0-70.el7fdp.1?arch=x86_64" } } }, { "category": "product_version", "name": "openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.x86_64", "product": { "name": "openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.x86_64", "product_id": "openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch-ovn-common@2.9.0-70.el7fdp.1?arch=x86_64" } } }, { "category": "product_version", "name": "openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.x86_64", "product": { "name": "openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.x86_64", "product_id": "openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch-debuginfo@2.9.0-70.el7fdp.1?arch=x86_64" } } }, { "category": "product_version", "name": "python-openvswitch-0:2.9.0-70.el7fdp.1.x86_64", "product": { "name": "python-openvswitch-0:2.9.0-70.el7fdp.1.x86_64", "product_id": "python-openvswitch-0:2.9.0-70.el7fdp.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-openvswitch@2.9.0-70.el7fdp.1?arch=x86_64" } } }, { "category": "product_version", "name": "openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.x86_64", "product": { "name": "openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.x86_64", "product_id": "openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch-ovn-vtep@2.9.0-70.el7fdp.1?arch=x86_64" } } }, { "category": "product_version", "name": "openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.x86_64", "product": { "name": "openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.x86_64", "product_id": "openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch-ovn-host@2.9.0-70.el7fdp.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openvswitch-0:2.9.0-70.el7fdp.1.src", "product": { "name": "openvswitch-0:2.9.0-70.el7fdp.1.src", "product_id": "openvswitch-0:2.9.0-70.el7fdp.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch@2.9.0-70.el7fdp.1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "product": { "name": "openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "product_id": "openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch@2.9.0-70.el7fdp.1?arch=ppc64le" } } }, { "category": "product_version", "name": "openvswitch-devel-0:2.9.0-70.el7fdp.1.ppc64le", "product": { "name": "openvswitch-devel-0:2.9.0-70.el7fdp.1.ppc64le", "product_id": "openvswitch-devel-0:2.9.0-70.el7fdp.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch-devel@2.9.0-70.el7fdp.1?arch=ppc64le" } } }, { "category": "product_version", "name": "openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.ppc64le", "product": { "name": "openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.ppc64le", "product_id": "openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch-ovn-central@2.9.0-70.el7fdp.1?arch=ppc64le" } } }, { "category": "product_version", "name": "openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.ppc64le", "product": { "name": "openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.ppc64le", "product_id": "openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch-ovn-common@2.9.0-70.el7fdp.1?arch=ppc64le" } } }, { "category": "product_version", "name": "openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.ppc64le", "product": { "name": "openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.ppc64le", "product_id": "openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch-debuginfo@2.9.0-70.el7fdp.1?arch=ppc64le" } } }, { "category": "product_version", "name": "python-openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "product": { "name": "python-openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "product_id": "python-openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-openvswitch@2.9.0-70.el7fdp.1?arch=ppc64le" } } }, { "category": "product_version", "name": "openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.ppc64le", "product": { "name": "openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.ppc64le", "product_id": "openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch-ovn-vtep@2.9.0-70.el7fdp.1?arch=ppc64le" } } }, { "category": "product_version", "name": "openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.ppc64le", "product": { "name": "openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.ppc64le", "product_id": "openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch-ovn-host@2.9.0-70.el7fdp.1?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "openvswitch-test-0:2.9.0-70.el7fdp.1.noarch", "product": { "name": "openvswitch-test-0:2.9.0-70.el7fdp.1.noarch", "product_id": "openvswitch-test-0:2.9.0-70.el7fdp.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch-test@2.9.0-70.el7fdp.1?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openvswitch-0:2.9.0-70.el7fdp.1.ppc64le as a component of Red Hat Virtualization 4.2 Management Agent for RHEL 7.6 EUS Hosts", "product_id": "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-0:2.9.0-70.el7fdp.1.ppc64le" }, "product_reference": "openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Agents-eus" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-0:2.9.0-70.el7fdp.1.src as a component of Red Hat Virtualization 4.2 Management Agent for RHEL 7.6 EUS Hosts", "product_id": "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-0:2.9.0-70.el7fdp.1.src" }, "product_reference": "openvswitch-0:2.9.0-70.el7fdp.1.src", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Agents-eus" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-0:2.9.0-70.el7fdp.1.x86_64 as a component of Red Hat Virtualization 4.2 Management Agent for RHEL 7.6 EUS Hosts", "product_id": "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-0:2.9.0-70.el7fdp.1.x86_64" }, "product_reference": "openvswitch-0:2.9.0-70.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Agents-eus" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.ppc64le as a component of Red Hat Virtualization 4.2 Management Agent for RHEL 7.6 EUS Hosts", "product_id": "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.ppc64le" }, "product_reference": "openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.ppc64le", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Agents-eus" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.x86_64 as a component of Red Hat Virtualization 4.2 Management Agent for RHEL 7.6 EUS Hosts", "product_id": "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.x86_64" }, "product_reference": "openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Agents-eus" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-devel-0:2.9.0-70.el7fdp.1.ppc64le as a component of Red Hat Virtualization 4.2 Management Agent for RHEL 7.6 EUS Hosts", "product_id": "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-devel-0:2.9.0-70.el7fdp.1.ppc64le" }, "product_reference": "openvswitch-devel-0:2.9.0-70.el7fdp.1.ppc64le", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Agents-eus" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-devel-0:2.9.0-70.el7fdp.1.x86_64 as a component of Red Hat Virtualization 4.2 Management Agent for RHEL 7.6 EUS Hosts", "product_id": "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-devel-0:2.9.0-70.el7fdp.1.x86_64" }, "product_reference": "openvswitch-devel-0:2.9.0-70.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Agents-eus" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.ppc64le as a component of Red Hat Virtualization 4.2 Management Agent for RHEL 7.6 EUS Hosts", "product_id": "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.ppc64le" }, "product_reference": "openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.ppc64le", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Agents-eus" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.x86_64 as a component of Red Hat Virtualization 4.2 Management Agent for RHEL 7.6 EUS Hosts", "product_id": "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.x86_64" }, "product_reference": "openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Agents-eus" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.ppc64le as a component of Red Hat Virtualization 4.2 Management Agent for RHEL 7.6 EUS Hosts", "product_id": "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.ppc64le" }, "product_reference": "openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.ppc64le", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Agents-eus" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.x86_64 as a component of Red Hat Virtualization 4.2 Management Agent for RHEL 7.6 EUS Hosts", "product_id": "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.x86_64" }, "product_reference": "openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Agents-eus" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.ppc64le as a component of Red Hat Virtualization 4.2 Management Agent for RHEL 7.6 EUS Hosts", "product_id": "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.ppc64le" }, "product_reference": "openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.ppc64le", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Agents-eus" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.x86_64 as a component of Red Hat Virtualization 4.2 Management Agent for RHEL 7.6 EUS Hosts", "product_id": "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.x86_64" }, "product_reference": "openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Agents-eus" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.ppc64le as a component of Red Hat Virtualization 4.2 Management Agent for RHEL 7.6 EUS Hosts", "product_id": "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.ppc64le" }, "product_reference": "openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.ppc64le", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Agents-eus" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.x86_64 as a component of Red Hat Virtualization 4.2 Management Agent for RHEL 7.6 EUS Hosts", "product_id": "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.x86_64" }, "product_reference": "openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Agents-eus" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-test-0:2.9.0-70.el7fdp.1.noarch as a component of Red Hat Virtualization 4.2 Management Agent for RHEL 7.6 EUS Hosts", "product_id": "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-test-0:2.9.0-70.el7fdp.1.noarch" }, "product_reference": "openvswitch-test-0:2.9.0-70.el7fdp.1.noarch", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Agents-eus" }, { "category": "default_component_of", "full_product_name": { "name": "python-openvswitch-0:2.9.0-70.el7fdp.1.ppc64le as a component of Red Hat Virtualization 4.2 Management Agent for RHEL 7.6 EUS Hosts", "product_id": "7Server-7.6.EUS-RHV-4.2-Agents-eus:python-openvswitch-0:2.9.0-70.el7fdp.1.ppc64le" }, "product_reference": "python-openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Agents-eus" }, { "category": "default_component_of", "full_product_name": { "name": "python-openvswitch-0:2.9.0-70.el7fdp.1.x86_64 as a component of Red Hat Virtualization 4.2 Management Agent for RHEL 7.6 EUS Hosts", "product_id": "7Server-7.6.EUS-RHV-4.2-Agents-eus:python-openvswitch-0:2.9.0-70.el7fdp.1.x86_64" }, "product_reference": "python-openvswitch-0:2.9.0-70.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Agents-eus" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-0:2.9.0-70.el7fdp.1.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 7", "product_id": "7Server-RH7-Fast-Datapath:openvswitch-0:2.9.0-70.el7fdp.1.ppc64le" }, "product_reference": "openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "relates_to_product_reference": "7Server-RH7-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-0:2.9.0-70.el7fdp.1.src as a component of Fast Datapath for Red Hat Enterprise Linux 7", "product_id": "7Server-RH7-Fast-Datapath:openvswitch-0:2.9.0-70.el7fdp.1.src" }, "product_reference": "openvswitch-0:2.9.0-70.el7fdp.1.src", "relates_to_product_reference": "7Server-RH7-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-0:2.9.0-70.el7fdp.1.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 7", "product_id": "7Server-RH7-Fast-Datapath:openvswitch-0:2.9.0-70.el7fdp.1.x86_64" }, "product_reference": "openvswitch-0:2.9.0-70.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-RH7-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 7", "product_id": "7Server-RH7-Fast-Datapath:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.ppc64le" }, "product_reference": "openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.ppc64le", "relates_to_product_reference": "7Server-RH7-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 7", "product_id": "7Server-RH7-Fast-Datapath:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.x86_64" }, "product_reference": "openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-RH7-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-devel-0:2.9.0-70.el7fdp.1.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 7", "product_id": "7Server-RH7-Fast-Datapath:openvswitch-devel-0:2.9.0-70.el7fdp.1.ppc64le" }, "product_reference": "openvswitch-devel-0:2.9.0-70.el7fdp.1.ppc64le", "relates_to_product_reference": "7Server-RH7-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-devel-0:2.9.0-70.el7fdp.1.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 7", "product_id": "7Server-RH7-Fast-Datapath:openvswitch-devel-0:2.9.0-70.el7fdp.1.x86_64" }, "product_reference": "openvswitch-devel-0:2.9.0-70.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-RH7-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 7", "product_id": "7Server-RH7-Fast-Datapath:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.ppc64le" }, "product_reference": "openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.ppc64le", "relates_to_product_reference": "7Server-RH7-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 7", "product_id": "7Server-RH7-Fast-Datapath:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.x86_64" }, "product_reference": "openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-RH7-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 7", "product_id": "7Server-RH7-Fast-Datapath:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.ppc64le" }, "product_reference": "openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.ppc64le", "relates_to_product_reference": "7Server-RH7-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 7", "product_id": "7Server-RH7-Fast-Datapath:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.x86_64" }, "product_reference": "openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-RH7-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 7", "product_id": "7Server-RH7-Fast-Datapath:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.ppc64le" }, "product_reference": "openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.ppc64le", "relates_to_product_reference": "7Server-RH7-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 7", "product_id": "7Server-RH7-Fast-Datapath:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.x86_64" }, "product_reference": "openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-RH7-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 7", "product_id": "7Server-RH7-Fast-Datapath:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.ppc64le" }, "product_reference": "openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.ppc64le", "relates_to_product_reference": "7Server-RH7-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 7", "product_id": "7Server-RH7-Fast-Datapath:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.x86_64" }, "product_reference": "openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-RH7-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch-test-0:2.9.0-70.el7fdp.1.noarch as a component of Fast Datapath for Red Hat Enterprise Linux 7", "product_id": "7Server-RH7-Fast-Datapath:openvswitch-test-0:2.9.0-70.el7fdp.1.noarch" }, "product_reference": "openvswitch-test-0:2.9.0-70.el7fdp.1.noarch", "relates_to_product_reference": "7Server-RH7-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "python-openvswitch-0:2.9.0-70.el7fdp.1.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 7", "product_id": "7Server-RH7-Fast-Datapath:python-openvswitch-0:2.9.0-70.el7fdp.1.ppc64le" }, "product_reference": "python-openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "relates_to_product_reference": "7Server-RH7-Fast-Datapath" }, { "category": "default_component_of", "full_product_name": { "name": "python-openvswitch-0:2.9.0-70.el7fdp.1.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 7", "product_id": "7Server-RH7-Fast-Datapath:python-openvswitch-0:2.9.0-70.el7fdp.1.x86_64" }, "product_reference": "python-openvswitch-0:2.9.0-70.el7fdp.1.x86_64", "relates_to_product_reference": "7Server-RH7-Fast-Datapath" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-17204", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2018-09-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1632522" } ], "notes": [ { "category": "description", "text": "An issue was discovered in Open vSwitch (OvS), 2.4.x through 2.4.1, 2.5.x through 2.5.5, 2.6.x through 2.6.3, 2.7.x through 2.7.6, 2.8.x through 2.8.4, and2.9.x through 2.9.2, affecting the parse_group_prop_ntr_selection_method in lib/ofp-util.c. On controllers with the OpenFlow 1.5 decoder enabled, a specially crafted group update can cause an assertion failure, potentially leading to a Denial of Service condition.", "title": "Vulnerability description" }, { "category": "summary", "text": "openvswitch: Mishandle of group mods in lib/ofp-util.c:parse_group_prop_ntr_selection_method() allows for assertion failure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-0:2.9.0-70.el7fdp.1.src", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-devel-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-devel-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-test-0:2.9.0-70.el7fdp.1.noarch", "7Server-7.6.EUS-RHV-4.2-Agents-eus:python-openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:python-openvswitch-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-0:2.9.0-70.el7fdp.1.src", "7Server-RH7-Fast-Datapath:openvswitch-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-devel-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-devel-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-test-0:2.9.0-70.el7fdp.1.noarch", "7Server-RH7-Fast-Datapath:python-openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:python-openvswitch-0:2.9.0-70.el7fdp.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-17204" }, { "category": "external", "summary": "RHBZ#1632522", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1632522" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-17204", "url": "https://www.cve.org/CVERecord?id=CVE-2018-17204" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-17204", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-17204" } ], "release_date": "2018-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-11-05T14:56:37+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-0:2.9.0-70.el7fdp.1.src", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-devel-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-devel-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-test-0:2.9.0-70.el7fdp.1.noarch", "7Server-7.6.EUS-RHV-4.2-Agents-eus:python-openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:python-openvswitch-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-0:2.9.0-70.el7fdp.1.src", "7Server-RH7-Fast-Datapath:openvswitch-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-devel-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-devel-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-test-0:2.9.0-70.el7fdp.1.noarch", "7Server-RH7-Fast-Datapath:python-openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:python-openvswitch-0:2.9.0-70.el7fdp.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:3500" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 2.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-0:2.9.0-70.el7fdp.1.src", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-devel-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-devel-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-test-0:2.9.0-70.el7fdp.1.noarch", "7Server-7.6.EUS-RHV-4.2-Agents-eus:python-openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:python-openvswitch-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-0:2.9.0-70.el7fdp.1.src", "7Server-RH7-Fast-Datapath:openvswitch-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-devel-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-devel-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-test-0:2.9.0-70.el7fdp.1.noarch", "7Server-RH7-Fast-Datapath:python-openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:python-openvswitch-0:2.9.0-70.el7fdp.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openvswitch: Mishandle of group mods in lib/ofp-util.c:parse_group_prop_ntr_selection_method() allows for assertion failure" }, { "cve": "CVE-2018-17205", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2018-09-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1632525" } ], "notes": [ { "category": "description", "text": "An issue was discovered in Open vSwitch (OvS), 2.7.x through 2.7.6, 2.8.x through 2.8.4, and 2.9.x through 2.9.2, where the ofproto_rule_insert__() function inside ofproto/ofproto.c is affected by an assertion failure under certain circumstances.\r\nA specially crafted flow update applied using the bundling feature of Open vSwitch could potentially cause the assertion failure, potentially leading to incorrect flow information being applied, or a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "openvswitch: Error during bundle commit in ofproto/ofproto.c:ofproto_rule_insert__() allows for crash", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-0:2.9.0-70.el7fdp.1.src", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-devel-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-devel-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-test-0:2.9.0-70.el7fdp.1.noarch", "7Server-7.6.EUS-RHV-4.2-Agents-eus:python-openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:python-openvswitch-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-0:2.9.0-70.el7fdp.1.src", "7Server-RH7-Fast-Datapath:openvswitch-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-devel-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-devel-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-test-0:2.9.0-70.el7fdp.1.noarch", "7Server-RH7-Fast-Datapath:python-openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:python-openvswitch-0:2.9.0-70.el7fdp.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-17205" }, { "category": "external", "summary": "RHBZ#1632525", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1632525" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-17205", "url": "https://www.cve.org/CVERecord?id=CVE-2018-17205" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-17205", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-17205" } ], "release_date": "2018-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-11-05T14:56:37+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-0:2.9.0-70.el7fdp.1.src", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-devel-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-devel-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-test-0:2.9.0-70.el7fdp.1.noarch", "7Server-7.6.EUS-RHV-4.2-Agents-eus:python-openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:python-openvswitch-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-0:2.9.0-70.el7fdp.1.src", "7Server-RH7-Fast-Datapath:openvswitch-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-devel-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-devel-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-test-0:2.9.0-70.el7fdp.1.noarch", "7Server-RH7-Fast-Datapath:python-openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:python-openvswitch-0:2.9.0-70.el7fdp.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:3500" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-0:2.9.0-70.el7fdp.1.src", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-devel-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-devel-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-test-0:2.9.0-70.el7fdp.1.noarch", "7Server-7.6.EUS-RHV-4.2-Agents-eus:python-openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:python-openvswitch-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-0:2.9.0-70.el7fdp.1.src", "7Server-RH7-Fast-Datapath:openvswitch-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-devel-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-devel-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-test-0:2.9.0-70.el7fdp.1.noarch", "7Server-RH7-Fast-Datapath:python-openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:python-openvswitch-0:2.9.0-70.el7fdp.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openvswitch: Error during bundle commit in ofproto/ofproto.c:ofproto_rule_insert__() allows for crash" }, { "cve": "CVE-2018-17206", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2018-09-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1632528" } ], "notes": [ { "category": "description", "text": "An issue was discovered in Open vSwitch (OvS) 2.5.x through 2.5.5, 2.6.x through 2.6.3, 2.7.x through 2.7.6, 2.8.x through 2.8.4, and 2.9.x through 2.9.2 where the decode_bundle function inside lib/ofp-actions.c is affected by a buffer over-read issue during BUNDLE action decoding.\r\nA specially crafted flow update applied using the bundling feature of Open vSwitch could potentially cause a crash leading to a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "openvswitch: Buffer over-read in lib/ofp-actions.c:decode_bundle()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-0:2.9.0-70.el7fdp.1.src", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-devel-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-devel-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-test-0:2.9.0-70.el7fdp.1.noarch", "7Server-7.6.EUS-RHV-4.2-Agents-eus:python-openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:python-openvswitch-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-0:2.9.0-70.el7fdp.1.src", "7Server-RH7-Fast-Datapath:openvswitch-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-devel-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-devel-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-test-0:2.9.0-70.el7fdp.1.noarch", "7Server-RH7-Fast-Datapath:python-openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:python-openvswitch-0:2.9.0-70.el7fdp.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-17206" }, { "category": "external", "summary": "RHBZ#1632528", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1632528" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-17206", "url": "https://www.cve.org/CVERecord?id=CVE-2018-17206" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-17206", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-17206" } ], "release_date": "2018-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-11-05T14:56:37+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-0:2.9.0-70.el7fdp.1.src", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-devel-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-devel-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-test-0:2.9.0-70.el7fdp.1.noarch", "7Server-7.6.EUS-RHV-4.2-Agents-eus:python-openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:python-openvswitch-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-0:2.9.0-70.el7fdp.1.src", "7Server-RH7-Fast-Datapath:openvswitch-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-devel-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-devel-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-test-0:2.9.0-70.el7fdp.1.noarch", "7Server-RH7-Fast-Datapath:python-openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:python-openvswitch-0:2.9.0-70.el7fdp.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:3500" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-0:2.9.0-70.el7fdp.1.src", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-devel-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-devel-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.x86_64", "7Server-7.6.EUS-RHV-4.2-Agents-eus:openvswitch-test-0:2.9.0-70.el7fdp.1.noarch", "7Server-7.6.EUS-RHV-4.2-Agents-eus:python-openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-7.6.EUS-RHV-4.2-Agents-eus:python-openvswitch-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-0:2.9.0-70.el7fdp.1.src", "7Server-RH7-Fast-Datapath:openvswitch-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-debuginfo-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-devel-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-devel-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-ovn-central-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-ovn-common-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-ovn-host-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:openvswitch-ovn-vtep-0:2.9.0-70.el7fdp.1.x86_64", "7Server-RH7-Fast-Datapath:openvswitch-test-0:2.9.0-70.el7fdp.1.noarch", "7Server-RH7-Fast-Datapath:python-openvswitch-0:2.9.0-70.el7fdp.1.ppc64le", "7Server-RH7-Fast-Datapath:python-openvswitch-0:2.9.0-70.el7fdp.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openvswitch: Buffer over-read in lib/ofp-actions.c:decode_bundle()" } ] }
ghsa-pcf7-fwpx-5mr2
Vulnerability from github
An issue was discovered in Open vSwitch (OvS) 2.7.x through 2.7.6. The decode_bundle function inside lib/ofp-actions.c is affected by a buffer over-read issue during BUNDLE action decoding.
{ "affected": [], "aliases": [ "CVE-2018-17206" ], "database_specific": { "cwe_ids": [ "CWE-125" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2018-09-19T16:29:00Z", "severity": "MODERATE" }, "details": "An issue was discovered in Open vSwitch (OvS) 2.7.x through 2.7.6. The decode_bundle function inside lib/ofp-actions.c is affected by a buffer over-read issue during BUNDLE action decoding.", "id": "GHSA-pcf7-fwpx-5mr2", "modified": "2022-05-13T01:07:37Z", "published": "2022-05-13T01:07:37Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-17206" }, { "type": "WEB", "url": "https://github.com/openvswitch/ovs/commit/9237a63c47bd314b807cda0bd2216264e82edbe8" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:3500" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:0053" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:0081" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00032.html" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3873-1" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.