[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]

[RHSA-2019:0081-01] Moderate: openvswitch security and bug fix update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Moderate: openvswitch security and bug fix update
Advisory ID:       RHSA-2019:0081-01
Product:           Red Hat Enterprise Linux OpenStack Platform
Advisory URL:      https://access.redhat.com/errata/RHSA-2019:0081
Issue date:        2019-01-16
CVE Names:         CVE-2018-17204 CVE-2018-17205 CVE-2018-17206 
=====================================================================

1. Summary:

An update for openvswitch is now available for Red Hat OpenStack Platform
13.0 (Queens).

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat OpenStack Platform 13.0 - noarch, ppc64le, x86_64

3. Description:

Open vSwitch provides standard network bridging functions and support for
the OpenFlow protocol for remote per-flow control of traffic.

Security Fix(es):

* openvswitch: Mishandle of group mods in
lib/ofp-util.c:parse_group_prop_ntr_selection_method() allows for assertion
failure (CVE-2018-17204)

* openvswitch: Error during bundle commit in
ofproto/ofproto.c:ofproto_rule_insert__() allows for crash (CVE-2018-17205)

* openvswitch: Buffer over-read in lib/ofp-actions.c:decode_bundle()
(CVE-2018-17206)

For more details about the security issue(s), including the impact, a CVSS
score, and other related information, refer to the CVE page(s) listed in
the References section.

Bug Fix(es):

* Previously, the first packet of a new connection using an OVN logical
router was used to discover the MAC address of the destination. This
resulted in the loss of the first packet on the new connection. This 
enhancement adds the capability to correctly queue the first packet of a
new connection, which prevents the loss of that packet. (BZ#1600115)

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1600115 - ping loss of first packet with OVN l3 logical router.
1632522 - CVE-2018-17204 openvswitch: Mishandle of group mods in lib/ofp-util.c:parse_group_prop_ntr_selection_method() allows for assertion failure
1632525 - CVE-2018-17205 openvswitch: Error during bundle commit in ofproto/ofproto.c:ofproto_rule_insert__() allows for crash
1632528 - CVE-2018-17206 openvswitch: Buffer over-read in lib/ofp-actions.c:decode_bundle()
1651453 - openvswitch package release request including the fix of RHBZ#1526306 for RHOSP13

6. Package List:

Red Hat OpenStack Platform 13.0:

Source:
openvswitch-2.9.0-83.el7fdp.1.src.rpm

ppc64le:
openvswitch-2.9.0-83.el7fdp.1.ppc64le.rpm
openvswitch-debuginfo-2.9.0-83.el7fdp.1.ppc64le.rpm
openvswitch-ovn-central-2.9.0-83.el7fdp.1.ppc64le.rpm
openvswitch-ovn-common-2.9.0-83.el7fdp.1.ppc64le.rpm
openvswitch-ovn-host-2.9.0-83.el7fdp.1.ppc64le.rpm
openvswitch-ovn-vtep-2.9.0-83.el7fdp.1.ppc64le.rpm
python-openvswitch-2.9.0-83.el7fdp.1.ppc64le.rpm

x86_64:
openvswitch-2.9.0-83.el7fdp.1.x86_64.rpm
openvswitch-debuginfo-2.9.0-83.el7fdp.1.x86_64.rpm
openvswitch-ovn-central-2.9.0-83.el7fdp.1.x86_64.rpm
openvswitch-ovn-common-2.9.0-83.el7fdp.1.x86_64.rpm
openvswitch-ovn-host-2.9.0-83.el7fdp.1.x86_64.rpm
openvswitch-ovn-vtep-2.9.0-83.el7fdp.1.x86_64.rpm
python-openvswitch-2.9.0-83.el7fdp.1.x86_64.rpm

Red Hat OpenStack Platform 13.0:

noarch:
openvswitch-test-2.9.0-83.el7fdp.1.noarch.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2018-17204
https://access.redhat.com/security/cve/CVE-2018-17205
https://access.redhat.com/security/cve/CVE-2018-17206
https://access.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is <secalert redhat com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2019 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=QJwB
-----END PGP SIGNATURE-----


[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]