exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Red Hat Security Advisory 2019-0081-01

Red Hat Security Advisory 2019-0081-01
Posted Jan 17, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-0081-01 - Open vSwitch provides standard network bridging functions and support for the OpenFlow protocol for remote per-flow control of traffic. Issues addressed include buffer over-read and assertion failure vulnerabilities.

tags | advisory, remote, vulnerability, protocol
systems | linux, redhat
advisories | CVE-2018-17204, CVE-2018-17205, CVE-2018-17206
SHA-256 | f75b0d16e83426e9dfc3323902017e37f639d875944ce19bbc8e7ecaac16033f

Red Hat Security Advisory 2019-0081-01

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================
Red Hat Security Advisory

Synopsis: Moderate: openvswitch security and bug fix update
Advisory ID: RHSA-2019:0081-01
Product: Red Hat Enterprise Linux OpenStack Platform
Advisory URL: https://access.redhat.com/errata/RHSA-2019:0081
Issue date: 2019-01-16
CVE Names: CVE-2018-17204 CVE-2018-17205 CVE-2018-17206
====================================================================
1. Summary:

An update for openvswitch is now available for Red Hat OpenStack Platform
13.0 (Queens).

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat OpenStack Platform 13.0 - noarch, ppc64le, x86_64

3. Description:

Open vSwitch provides standard network bridging functions and support for
the OpenFlow protocol for remote per-flow control of traffic.

Security Fix(es):

* openvswitch: Mishandle of group mods in
lib/ofp-util.c:parse_group_prop_ntr_selection_method() allows for assertion
failure (CVE-2018-17204)

* openvswitch: Error during bundle commit in
ofproto/ofproto.c:ofproto_rule_insert__() allows for crash (CVE-2018-17205)

* openvswitch: Buffer over-read in lib/ofp-actions.c:decode_bundle()
(CVE-2018-17206)

For more details about the security issue(s), including the impact, a CVSS
score, and other related information, refer to the CVE page(s) listed in
the References section.

Bug Fix(es):

* Previously, the first packet of a new connection using an OVN logical
router was used to discover the MAC address of the destination. This
resulted in the loss of the first packet on the new connection. This
enhancement adds the capability to correctly queue the first packet of a
new connection, which prevents the loss of that packet. (BZ#1600115)

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1600115 - ping loss of first packet with OVN l3 logical router.
1632522 - CVE-2018-17204 openvswitch: Mishandle of group mods in lib/ofp-util.c:parse_group_prop_ntr_selection_method() allows for assertion failure
1632525 - CVE-2018-17205 openvswitch: Error during bundle commit in ofproto/ofproto.c:ofproto_rule_insert__() allows for crash
1632528 - CVE-2018-17206 openvswitch: Buffer over-read in lib/ofp-actions.c:decode_bundle()
1651453 - openvswitch package release request including the fix of RHBZ#1526306 for RHOSP13

6. Package List:

Red Hat OpenStack Platform 13.0:

Source:
openvswitch-2.9.0-83.el7fdp.1.src.rpm

ppc64le:
openvswitch-2.9.0-83.el7fdp.1.ppc64le.rpm
openvswitch-debuginfo-2.9.0-83.el7fdp.1.ppc64le.rpm
openvswitch-ovn-central-2.9.0-83.el7fdp.1.ppc64le.rpm
openvswitch-ovn-common-2.9.0-83.el7fdp.1.ppc64le.rpm
openvswitch-ovn-host-2.9.0-83.el7fdp.1.ppc64le.rpm
openvswitch-ovn-vtep-2.9.0-83.el7fdp.1.ppc64le.rpm
python-openvswitch-2.9.0-83.el7fdp.1.ppc64le.rpm

x86_64:
openvswitch-2.9.0-83.el7fdp.1.x86_64.rpm
openvswitch-debuginfo-2.9.0-83.el7fdp.1.x86_64.rpm
openvswitch-ovn-central-2.9.0-83.el7fdp.1.x86_64.rpm
openvswitch-ovn-common-2.9.0-83.el7fdp.1.x86_64.rpm
openvswitch-ovn-host-2.9.0-83.el7fdp.1.x86_64.rpm
openvswitch-ovn-vtep-2.9.0-83.el7fdp.1.x86_64.rpm
python-openvswitch-2.9.0-83.el7fdp.1.x86_64.rpm

Red Hat OpenStack Platform 13.0:

noarch:
openvswitch-test-2.9.0-83.el7fdp.1.noarch.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2018-17204
https://access.redhat.com/security/cve/CVE-2018-17205
https://access.redhat.com/security/cve/CVE-2018-17206
https://access.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2019 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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QJwB
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close