Rapid7 Vulnerability & Exploit Database

Red Hat: CVE-2018-17205: Moderate: openvswitch security, bug fix, and enhancement update (RHSA-2018:3500)

Back to Search

Red Hat: CVE-2018-17205: Moderate: openvswitch security, bug fix, and enhancement update (RHSA-2018:3500)

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
09/19/2018
Created
03/19/2019
Added
11/06/2018
Modified
03/03/2021

Description

An issue was discovered in Open vSwitch (OvS) 2.7.x through 2.7.6, affecting ofproto_rule_insert__ in ofproto/ofproto.c. During bundle commit, flows that are added in a bundle are applied to ofproto in order. If a flow cannot be added (e.g., the flow action is a go-to for a group id that does not exist), OvS tries to revert back all previous flows that were successfully applied from the same bundle. This is possible since OvS maintains list of old flows that were replaced by flows from the bundle. While reinserting old flows, OvS has an assertion failure due to a check on rule state != RULE_INITIALIZED. This would work for new flows, but for an old flow the rule state is RULE_REMOVED. The assertion failure causes an OvS crash.

Solution(s)

  • redhat-upgrade-openvswitch
  • redhat-upgrade-openvswitch-debuginfo
  • redhat-upgrade-openvswitch-devel
  • redhat-upgrade-openvswitch-ovn-central
  • redhat-upgrade-openvswitch-ovn-common
  • redhat-upgrade-openvswitch-ovn-host
  • redhat-upgrade-openvswitch-ovn-vtep
  • redhat-upgrade-openvswitch-test
  • redhat-upgrade-python-openvswitch

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;