ID

VAR-201809-0316


CVE

CVE-2018-17205


TITLE

Open vSwitch Input validation vulnerability

Trust: 1.4

sources: JVNDB: JVNDB-2018-013986 // CNNVD: CNNVD-201809-881

DESCRIPTION

An issue was discovered in Open vSwitch (OvS) 2.7.x through 2.7.6, affecting ofproto_rule_insert__ in ofproto/ofproto.c. During bundle commit, flows that are added in a bundle are applied to ofproto in order. If a flow cannot be added (e.g., the flow action is a go-to for a group id that does not exist), OvS tries to revert back all previous flows that were successfully applied from the same bundle. This is possible since OvS maintains list of old flows that were replaced by flows from the bundle. While reinserting old flows, OvS has an assertion failure due to a check on rule state != RULE_INITIALIZED. This would work for new flows, but for an old flow the rule state is RULE_REMOVED. The assertion failure causes an OvS crash. Open vSwitch (OvS) Contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Open vSwitch is prone to a remote denial-of-service vulnerability. Attackers can exploit this issue to cause a denial-of-service condition, denying service to legitimate users. Open vSwitch 2.7.0 through 2.7.6, 2.8.0 through 2.8.4, and 2.9.0 through 2.9.2 are vulnerable. Open vSwitch (OvS) is a multi-layer virtual switch product based on open source technology (according to the Apache2.0 license). It supports large-scale network automation, standard management interfaces and protocols, etc. through programming extensions. There is a security vulnerability in the 'ofproto_rule_insert__' function of the ofproto/ofproto.c file in OvS 2.7.x to 2.7.6. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: openvswitch security, bug fix, and enhancement update Advisory ID: RHSA-2018:3500-01 Product: Fast Datapath Advisory URL: https://access.redhat.com/errata/RHSA-2018:3500 Issue date: 2018-11-05 CVE Names: CVE-2018-17204 CVE-2018-17205 CVE-2018-17206 ===================================================================== 1. Summary: An update for openvswitch is now available for Fast Datapath for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Channel to provide early releases to layered products - noarch, ppc64le, x86_64 3. Description: Open vSwitch provides standard network bridging functions and support for the OpenFlow protocol for remote per-flow control of traffic. Security Fix(es): * openvswitch: Mishandle of group mods in lib/ofp-util.c:parse_group_prop_ntr_selection_method() allows for assertion failure (CVE-2018-17204) * openvswitch: Error during bundle commit in ofproto/ofproto.c:ofproto_rule_insert__() allows for crash (CVE-2018-17205) * openvswitch: Buffer over-read in lib/ofp-actions.c:decode_bundle() (CVE-2018-17206) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Previously, when the ovs-vswitchd service restarted, an error displayed with many open files. With this update, the number of sockets opened by ovs-vswitchd is decreased. As a result, the described problem no longer occurs. (BZ#1526306) * Previously, when OpenvSwitch service was reloaded, the default flow was not removed and it became part of the final flow table. With this update, the default flow rule is no longer added after a service reload. As a result, the described problem no longer occurs. (BZ#1626096) Enhancement(s): * With this update, the pmd-rxq-assign configuration has been added to Poll Mode Drivers (PMDs) cores. This allows users to select a round-robin assignment. (BZ#1616001) * With this update the ovs-appctl connection-status command has been introduced to the ovs-appctl utility. The command enables to monitor hypervisor (HV) south bound database (SBDB) connection status. Layered products can now check if the ovn-controller is properly connected to a central node. (BZ#1593804) * With this update, a support for the Dynamic Host Configuration Protocol (DHCP) option 252 has been added to Open Virtual Network (OVN) Native DHCP. (BZ#1641765) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1526306 - ovs-vswitchd service hangs with Error too many open files 1580217 - [ovn]ipv6 load balancer for layer4 on logical router doesn't work 1593804 - ovn-controller: report when was the most recent successful communication with central 1609643 - Running/destroying testpmd in guest which enabling vIOMMU can cause host ovs-vswitchd[10869]: segfault 1616001 - [RFE] Add option to OVS 2.9 for legacy RXQ assignment to cores 1618488 - vhost-user backend crash on SET_MEM_TABLE request handling while port enabled 1626096 - systemctl reload openvswitch includes default flow. 1627711 - Backport "net/mlx{4,5}: avoid stripping the glue library" commits 1632522 - CVE-2018-17204 openvswitch: Mishandle of group mods in lib/ofp-util.c:parse_group_prop_ntr_selection_method() allows for assertion failure 1632525 - CVE-2018-17205 openvswitch: Error during bundle commit in ofproto/ofproto.c:ofproto_rule_insert__() allows for crash 1632528 - CVE-2018-17206 openvswitch: Buffer over-read in lib/ofp-actions.c:decode_bundle() 1641765 - [RFE] Support DHCP Option 252 in OVN Native DHCP 1643527 - Link OVS binaries statically 6. Package List: Channel to provide early releases to layered products: Source: openvswitch-2.9.0-70.el7fdp.1.src.rpm noarch: openvswitch-test-2.9.0-70.el7fdp.1.noarch.rpm ppc64le: openvswitch-2.9.0-70.el7fdp.1.ppc64le.rpm openvswitch-debuginfo-2.9.0-70.el7fdp.1.ppc64le.rpm openvswitch-devel-2.9.0-70.el7fdp.1.ppc64le.rpm openvswitch-ovn-central-2.9.0-70.el7fdp.1.ppc64le.rpm openvswitch-ovn-common-2.9.0-70.el7fdp.1.ppc64le.rpm openvswitch-ovn-host-2.9.0-70.el7fdp.1.ppc64le.rpm openvswitch-ovn-vtep-2.9.0-70.el7fdp.1.ppc64le.rpm python-openvswitch-2.9.0-70.el7fdp.1.ppc64le.rpm x86_64: openvswitch-2.9.0-70.el7fdp.1.x86_64.rpm openvswitch-debuginfo-2.9.0-70.el7fdp.1.x86_64.rpm openvswitch-devel-2.9.0-70.el7fdp.1.x86_64.rpm openvswitch-ovn-central-2.9.0-70.el7fdp.1.x86_64.rpm openvswitch-ovn-common-2.9.0-70.el7fdp.1.x86_64.rpm openvswitch-ovn-host-2.9.0-70.el7fdp.1.x86_64.rpm openvswitch-ovn-vtep-2.9.0-70.el7fdp.1.x86_64.rpm python-openvswitch-2.9.0-70.el7fdp.1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2018-17204 https://access.redhat.com/security/cve/CVE-2018-17205 https://access.redhat.com/security/cve/CVE-2018-17206 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2018 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBW+BaCNzjgjWX9erEAQikXA/+OAaZIP3DWfdjyY8bMRbrRg9/VyGE3Go6 gS4wxrZh9yswHeG/RcTyfdWGceW/naWYC2fvPi+Vl8GRBoONNX76Z5bjkPx77/PF qUZpbNQG7aplbWkeuUIT1oWGDJ7Ax8Li0+zYBcr0MaOSiHJl5kOFsLYtYa/42WAg 9BgOeY+ZIJWrCNAFk6zGPGX/UejjZWuz/GJ7TL0V+W0XwvlPDZ4RCsmaCEBpYKrH R0SUmjl/fk3QCaMo77DfZeRLRPmFFNVYvIbx6OpZM/fA2neCpyBF6IkJF2KQbGoK JOTm85/ExVa2J6SO6LM6f/ZRhXciVZLPAYLvG/L/I4CWyyji8WEveNz+M3iHTooS hmqRw8msNBBogEQzke9KHVzuqQR14HhWs/lpeVI9KSh6fmkRnCpr3J764nNQhtHm f+ONma/8R0eqLsSSKoohQMrWy7WSAudDI9NriQwMAy0YqkRjCGZUOUR3A6jkaBFO MK6uaN1IhRG3h3JiNMuR5f4hVRaIPyGE7ltlbPzMyUcBBuWkk/Su/HOI2SitWO/Q fWQ00dttwLjtK73KiHHsskbFRLLE67DR+3AOQyC4lk9RLKN82kbfx8APly2Jr7Ec B9Q3AUpMArCK1kZy3VsWSNO48ECWpXPo2z7ZNZfF3veXDntYSF19ZkADstzYu2+Q Cb3Z9eM3UQQ= =Cdfr -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . Bug Fix(es): * Previously, the first packet of a new connection using an OVN logical router was used to discover the MAC address of the destination. This resulted in the loss of the first packet on the new connection. This enhancement adds the capability to correctly queue the first packet of a new connection, which prevents the loss of that packet. (BZ#1600115) 4. Bugs fixed (https://bugzilla.redhat.com/): 1600115 - ping loss of first packet with OVN l3 logical router. ========================================================================== Ubuntu Security Notice USN-3873-1 January 30, 2019 openvswitch vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 18.04 LTS - Ubuntu 16.04 LTS Summary: Several security issues were fixed in Open vSwitch. Software Description: - openvswitch: Ethernet virtual switch Details: It was discovered that Open vSwitch incorrectly decoded certain packets. This issue only affected Ubuntu 18.04 LTS. (CVE-2018-17205) It was discovered that Open vSwitch incorrectly handled BUNDLE action decoding. (CVE-2018-17206) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 18.04 LTS: openvswitch-common 2.9.2-0ubuntu0.18.04.3 Ubuntu 16.04 LTS: openvswitch-common 2.5.5-0ubuntu0.16.04.2 In general, a standard system update will make all the necessary changes

Trust: 2.34

sources: NVD: CVE-2018-17205 // JVNDB: JVNDB-2018-013986 // BID: 107179 // VULHUB: VHN-127641 // PACKETSTORM: 151187 // PACKETSTORM: 150175 // PACKETSTORM: 151190 // PACKETSTORM: 151402

AFFECTED PRODUCTS

vendor:canonicalmodel:ubuntu linuxscope:eqversion:18.04

Trust: 1.0

vendor:redhatmodel:openstackscope:eqversion:13

Trust: 1.0

vendor:openvswitchmodel:openvswitchscope:gteversion:2.7.0

Trust: 1.0

vendor:openvswitchmodel:openvswitchscope:lteversion:2.7.6

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:16.04

Trust: 1.0

vendor:redhatmodel:openstackscope:eqversion:10

Trust: 1.0

vendor:open vswitchmodel:open vswitchscope:eqversion:2.7.6 for up to 2.7.x

Trust: 0.8

vendor:red hatmodel:openstackscope: - version: -

Trust: 0.8

vendor:red hatmodel:virtualizationscope: - version: -

Trust: 0.8

vendor:redhatmodel:virtualization managerscope:eqversion:4.2

Trust: 0.3

vendor:redhatmodel:virtualization for ibm power lescope:eqversion:4

Trust: 0.3

vendor:redhatmodel:virtualizationscope:eqversion:4

Trust: 0.3

vendor:redhatmodel:openstack platformscope:eqversion:9.0

Trust: 0.3

vendor:redhatmodel:openstack platformscope:eqversion:8.0

Trust: 0.3

vendor:redhatmodel:openstack platformscope:eqversion:13

Trust: 0.3

vendor:redhatmodel:openstack platformscope:eqversion:12

Trust: 0.3

vendor:redhatmodel:openstack platformscope:eqversion:10

Trust: 0.3

vendor:redhatmodel:openstack for ibm powerscope:eqversion:13

Trust: 0.3

vendor:redhatmodel:openstack director for rhelscope:eqversion:9.070

Trust: 0.3

vendor:redhatmodel:openstack director for rhelscope:eqversion:8.070

Trust: 0.3

vendor:redhatmodel:enterprise linux fast datapathscope:eqversion:7

Trust: 0.3

vendor:openvswitchmodel:openvswitchscope:eqversion:2.9.2

Trust: 0.3

vendor:openvswitchmodel:openvswitchscope:eqversion:2.9

Trust: 0.3

vendor:openvswitchmodel:openvswitchscope:eqversion:2.8.4

Trust: 0.3

vendor:openvswitchmodel:openvswitchscope:eqversion:2.8

Trust: 0.3

vendor:openvswitchmodel:openvswitchscope:eqversion:2.7.6

Trust: 0.3

vendor:openvswitchmodel:openvswitchscope:eqversion:2.7

Trust: 0.3

sources: BID: 107179 // JVNDB: JVNDB-2018-013986 // NVD: CVE-2018-17205

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-17205
value: HIGH

Trust: 1.0

NVD: CVE-2018-17205
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201809-881
value: HIGH

Trust: 0.6

VULHUB: VHN-127641
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2018-17205
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-127641
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-17205
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-127641 // JVNDB: JVNDB-2018-013986 // CNNVD: CNNVD-201809-881 // NVD: CVE-2018-17205

PROBLEMTYPE DATA

problemtype:CWE-617

Trust: 1.1

problemtype:CWE-20

Trust: 0.9

sources: VULHUB: VHN-127641 // JVNDB: JVNDB-2018-013986 // NVD: CVE-2018-17205

THREAT TYPE

remote

Trust: 1.0

sources: PACKETSTORM: 151187 // PACKETSTORM: 150175 // PACKETSTORM: 151190 // PACKETSTORM: 151402 // CNNVD: CNNVD-201809-881

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-201809-881

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-013986

PATCH

title:ofproto: Fix OVS crash when reverting old flows in bundle commiturl:https://github.com/openvswitch/ovs/commit/0befd1f3745055c32940f5faf9559be6a14395e6

Trust: 0.8

title:RHSA-2018:3500url:https://access.redhat.com/errata/RHSA-2018:3500

Trust: 0.8

title:RHSA-2019:0053url:https://access.redhat.com/errata/RHSA-2019:0053

Trust: 0.8

title:RHSA-2019:0081url:https://access.redhat.com/errata/RHSA-2019:0081

Trust: 0.8

title:Open vSwitch Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=85002

Trust: 0.6

sources: JVNDB: JVNDB-2018-013986 // CNNVD: CNNVD-201809-881

EXTERNAL IDS

db:NVDid:CVE-2018-17205

Trust: 3.2

db:JVNDBid:JVNDB-2018-013986

Trust: 0.8

db:CNNVDid:CNNVD-201809-881

Trust: 0.7

db:BIDid:107179

Trust: 0.3

db:VULHUBid:VHN-127641

Trust: 0.1

db:PACKETSTORMid:151187

Trust: 0.1

db:PACKETSTORMid:150175

Trust: 0.1

db:PACKETSTORMid:151190

Trust: 0.1

db:PACKETSTORMid:151402

Trust: 0.1

sources: VULHUB: VHN-127641 // BID: 107179 // JVNDB: JVNDB-2018-013986 // PACKETSTORM: 151187 // PACKETSTORM: 150175 // PACKETSTORM: 151190 // PACKETSTORM: 151402 // CNNVD: CNNVD-201809-881 // NVD: CVE-2018-17205

REFERENCES

url:https://access.redhat.com/errata/rhsa-2018:3500

Trust: 2.1

url:https://access.redhat.com/errata/rhsa-2019:0053

Trust: 2.1

url:https://access.redhat.com/errata/rhsa-2019:0081

Trust: 2.1

url:https://github.com/openvswitch/ovs/commit/0befd1f3745055c32940f5faf9559be6a14395e6

Trust: 1.7

url:https://usn.ubuntu.com/3873-1/

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2018-17205

Trust: 1.2

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-17205

Trust: 0.8

url:https://access.redhat.com/security/cve/cve-2018-17205

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2018-17206

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2018-17204

Trust: 0.4

url:http://openvswitch.org/

Trust: 0.3

url:https://bugzilla.redhat.com/show_bug.cgi?id=1632525

Trust: 0.3

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2018-17206

Trust: 0.3

url:https://bugzilla.redhat.com/):

Trust: 0.3

url:https://access.redhat.com/security/team/key/

Trust: 0.3

url:https://access.redhat.com/articles/11258

Trust: 0.3

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2018-17204

Trust: 0.3

url:https://access.redhat.com/security/team/contact/

Trust: 0.3

url:https://launchpad.net/ubuntu/+source/openvswitch/2.9.2-0ubuntu0.18.04.3

Trust: 0.1

url:https://usn.ubuntu.com/usn/usn-3873-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/openvswitch/2.5.5-0ubuntu0.16.04.2

Trust: 0.1

sources: VULHUB: VHN-127641 // BID: 107179 // JVNDB: JVNDB-2018-013986 // PACKETSTORM: 151187 // PACKETSTORM: 150175 // PACKETSTORM: 151190 // PACKETSTORM: 151402 // CNNVD: CNNVD-201809-881 // NVD: CVE-2018-17205

CREDITS

The vendor reported this issue.

Trust: 0.3

sources: BID: 107179

SOURCES

db:VULHUBid:VHN-127641
db:BIDid:107179
db:JVNDBid:JVNDB-2018-013986
db:PACKETSTORMid:151187
db:PACKETSTORMid:150175
db:PACKETSTORMid:151190
db:PACKETSTORMid:151402
db:CNNVDid:CNNVD-201809-881
db:NVDid:CVE-2018-17205

LAST UPDATE DATE

2024-11-23T20:22:23.001000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-127641date:2020-10-15T00:00:00
db:BIDid:107179date:2018-09-25T00:00:00
db:JVNDBid:JVNDB-2018-013986date:2019-03-07T00:00:00
db:CNNVDid:CNNVD-201809-881date:2019-10-08T00:00:00
db:NVDid:CVE-2018-17205date:2024-11-21T03:54:05.487

SOURCES RELEASE DATE

db:VULHUBid:VHN-127641date:2018-09-19T00:00:00
db:BIDid:107179date:2018-09-25T00:00:00
db:JVNDBid:JVNDB-2018-013986date:2019-03-07T00:00:00
db:PACKETSTORMid:151187date:2019-01-17T00:03:15
db:PACKETSTORMid:150175date:2018-11-05T21:01:31
db:PACKETSTORMid:151190date:2019-01-17T00:14:02
db:PACKETSTORMid:151402date:2019-01-30T16:11:42
db:CNNVDid:CNNVD-201809-881date:2018-09-20T00:00:00
db:NVDid:CVE-2018-17205date:2018-09-19T16:29:01.003