vulnerability
CentOS Linux: CVE-2018-17204: Moderate: openvswitch security, bug fix, and enhancement update (CESA-2018:3500)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
4 | (AV:N/AC:L/Au:S/C:N/I:N/A:P) | Sep 19, 2018 | Aug 28, 2019 | May 25, 2023 |
Severity
4
CVSS
(AV:N/AC:L/Au:S/C:N/I:N/A:P)
Published
Sep 19, 2018
Added
Aug 28, 2019
Modified
May 25, 2023
Description
An issue was discovered in Open vSwitch (OvS) 2.7.x through 2.7.6, affecting parse_group_prop_ntr_selection_method in lib/ofp-util.c. When decoding a group mod, it validates the group type and command after the whole group mod has been decoded. The OF1.5 decoder, however, tries to use the type and command earlier, when it might still be invalid. This causes an assertion failure (via OVS_NOT_REACHED). ovs-vswitchd does not enable support for OpenFlow 1.5 by default.
Solution(s)
centos-upgrade-openvswitchcentos-upgrade-openvswitch-debuginfocentos-upgrade-openvswitch-develcentos-upgrade-openvswitch-ovn-centralcentos-upgrade-openvswitch-ovn-commoncentos-upgrade-openvswitch-ovn-hostcentos-upgrade-openvswitch-ovn-vtepcentos-upgrade-openvswitch-testcentos-upgrade-python-openvswitch

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.