Home / mailingsPDF  

[RHSA-2019:0081-01] Moderate: openvswitch security and bug fix update

Posted on 16 January 2019
RedHat

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Moderate: openvswitch security and bug fix update
Advisory ID: RHSA-2019:0081-01
Product: Red Hat Enterprise Linux OpenStack Platform
Advisory URL: https://access.redhat.com/errata/RHSA-2019:0081
Issue date: 2019-01-16
CVE Names: CVE-2018-17204 CVE-2018-17205 CVE-2018-17206
=====================================================================

1. Summary:

An update for openvswitch is now available for Red Hat OpenStack Platform
13.0 (Queens).

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat OpenStack Platform 13.0 - noarch, ppc64le, x86_64

3. Description:

Open vSwitch provides standard network bridging functions and support for
the OpenFlow protocol for remote per-flow control of traffic.

Security Fix(es):

* openvswitch: Mishandle of group mods in
lib/ofp-util.c:parse_group_prop_ntr_selection_method() allows for assertion
failure (CVE-2018-17204)

* openvswitch: Error during bundle commit in
ofproto/ofproto.c:ofproto_rule_insert__() allows for crash (CVE-2018-17205)

* openvswitch: Buffer over-read in lib/ofp-actions.c:decode_bundle()
(CVE-2018-17206)

For more details about the security issue(s), including the impact, a CVSS
score, and other related information, refer to the CVE page(s) listed in
the References section.

Bug Fix(es):

* Previously, the first packet of a new connection using an OVN logical
router was used to discover the MAC address of the destination. This
resulted in the loss of the first packet on the new connection. This
enhancement adds the capability to correctly queue the first packet of a
new connection, which prevents the loss of that packet. (BZ#1600115)

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1600115 - ping loss of first packet with OVN l3 logical router.
1632522 - CVE-2018-17204 openvswitch: Mishandle of group mods in lib/ofp-util.c:parse_group_prop_ntr_selection_method() allows for assertion failure
1632525 - CVE-2018-17205 openvswitch: Error during bundle commit in ofproto/ofproto.c:ofproto_rule_insert__() allows for crash
1632528 - CVE-2018-17206 openvswitch: Buffer over-read in lib/ofp-actions.c:decode_bundle()
1651453 - openvswitch package release request including the fix of RHBZ#1526306 for RHOSP13

6. Package List:

Red Hat OpenStack Platform 13.0:

Source:
openvswitch-2.9.0-83.el7fdp.1.src.rpm

ppc64le:
openvswitch-2.9.0-83.el7fdp.1.ppc64le.rpm
openvswitch-debuginfo-2.9.0-83.el7fdp.1.ppc64le.rpm
openvswitch-ovn-central-2.9.0-83.el7fdp.1.ppc64le.rpm
openvswitch-ovn-common-2.9.0-83.el7fdp.1.ppc64le.rpm
openvswitch-ovn-host-2.9.0-83.el7fdp.1.ppc64le.rpm
openvswitch-ovn-vtep-2.9.0-83.el7fdp.1.ppc64le.rpm
python-openvswitch-2.9.0-83.el7fdp.1.ppc64le.rpm

x86_64:
openvswitch-2.9.0-83.el7fdp.1.x86_64.rpm
openvswitch-debuginfo-2.9.0-83.el7fdp.1.x86_64.rpm
openvswitch-ovn-central-2.9.0-83.el7fdp.1.x86_64.rpm
openvswitch-ovn-common-2.9.0-83.el7fdp.1.x86_64.rpm
openvswitch-ovn-host-2.9.0-83.el7fdp.1.x86_64.rpm
openvswitch-ovn-vtep-2.9.0-83.el7fdp.1.x86_64.rpm
python-openvswitch-2.9.0-83.el7fdp.1.x86_64.rpm

Red Hat OpenStack Platform 13.0:

noarch:
openvswitch-test-2.9.0-83.el7fdp.1.noarch.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2018-17204
https://access.redhat.com/security/cve/CVE-2018-17205
https://access.redhat.com/security/cve/CVE-2018-17206
https://access.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2019 Red Hat, Inc.

 

TOP