ID

VAR-201809-0317


CVE

CVE-2018-17206


TITLE

Open vSwitch Vulnerable to out-of-bounds reading

Trust: 0.8

sources: JVNDB: JVNDB-2018-013987

DESCRIPTION

An issue was discovered in Open vSwitch (OvS) 2.7.x through 2.7.6. The decode_bundle function inside lib/ofp-actions.c is affected by a buffer over-read issue during BUNDLE action decoding. Open vSwitch (OvS) Contains an out-of-bounds vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Open vSwitch is prone to a remote denial-of-service vulnerability. Attackers can exploit this issue to crash the affected application, denying service to legitimate users. Open vSwitch 2.5.x through 2.5.5, 2.6.x through 2.6.3, 2.7.x through 2.7.6, 2.8.x through 2.8.4, and 2.9.x through 2.9.2 are vulnerable. Open vSwitch (OvS) is a multi-layer virtual switch product based on open source technology (according to the Apache2.0 license). It supports large-scale network automation, standard management interfaces and protocols, etc. through programming extensions. The 'decode_bundle' function of the lib/ofp-actions.c file in OvS 2.7.x to 2.7.6 has a buffer out-of-bounds read vulnerability. Currently there is no information about this vulnerability, please keep an eye on CNNVD or vendor announcements. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: openvswitch security, bug fix, and enhancement update Advisory ID: RHSA-2018:3500-01 Product: Fast Datapath Advisory URL: https://access.redhat.com/errata/RHSA-2018:3500 Issue date: 2018-11-05 CVE Names: CVE-2018-17204 CVE-2018-17205 CVE-2018-17206 ===================================================================== 1. Summary: An update for openvswitch is now available for Fast Datapath for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Channel to provide early releases to layered products - noarch, ppc64le, x86_64 3. Description: Open vSwitch provides standard network bridging functions and support for the OpenFlow protocol for remote per-flow control of traffic. Security Fix(es): * openvswitch: Mishandle of group mods in lib/ofp-util.c:parse_group_prop_ntr_selection_method() allows for assertion failure (CVE-2018-17204) * openvswitch: Error during bundle commit in ofproto/ofproto.c:ofproto_rule_insert__() allows for crash (CVE-2018-17205) * openvswitch: Buffer over-read in lib/ofp-actions.c:decode_bundle() (CVE-2018-17206) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Previously, when the ovs-vswitchd service restarted, an error displayed with many open files. With this update, the number of sockets opened by ovs-vswitchd is decreased. As a result, the described problem no longer occurs. (BZ#1526306) * Previously, when OpenvSwitch service was reloaded, the default flow was not removed and it became part of the final flow table. With this update, the default flow rule is no longer added after a service reload. As a result, the described problem no longer occurs. (BZ#1626096) Enhancement(s): * With this update, the pmd-rxq-assign configuration has been added to Poll Mode Drivers (PMDs) cores. This allows users to select a round-robin assignment. (BZ#1616001) * With this update the ovs-appctl connection-status command has been introduced to the ovs-appctl utility. The command enables to monitor hypervisor (HV) south bound database (SBDB) connection status. Layered products can now check if the ovn-controller is properly connected to a central node. (BZ#1593804) * With this update, a support for the Dynamic Host Configuration Protocol (DHCP) option 252 has been added to Open Virtual Network (OVN) Native DHCP. (BZ#1641765) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1526306 - ovs-vswitchd service hangs with Error too many open files 1580217 - [ovn]ipv6 load balancer for layer4 on logical router doesn't work 1593804 - ovn-controller: report when was the most recent successful communication with central 1609643 - Running/destroying testpmd in guest which enabling vIOMMU can cause host ovs-vswitchd[10869]: segfault 1616001 - [RFE] Add option to OVS 2.9 for legacy RXQ assignment to cores 1618488 - vhost-user backend crash on SET_MEM_TABLE request handling while port enabled 1626096 - systemctl reload openvswitch includes default flow. 1627711 - Backport "net/mlx{4,5}: avoid stripping the glue library" commits 1632522 - CVE-2018-17204 openvswitch: Mishandle of group mods in lib/ofp-util.c:parse_group_prop_ntr_selection_method() allows for assertion failure 1632525 - CVE-2018-17205 openvswitch: Error during bundle commit in ofproto/ofproto.c:ofproto_rule_insert__() allows for crash 1632528 - CVE-2018-17206 openvswitch: Buffer over-read in lib/ofp-actions.c:decode_bundle() 1641765 - [RFE] Support DHCP Option 252 in OVN Native DHCP 1643527 - Link OVS binaries statically 6. Package List: Channel to provide early releases to layered products: Source: openvswitch-2.9.0-70.el7fdp.1.src.rpm noarch: openvswitch-test-2.9.0-70.el7fdp.1.noarch.rpm ppc64le: openvswitch-2.9.0-70.el7fdp.1.ppc64le.rpm openvswitch-debuginfo-2.9.0-70.el7fdp.1.ppc64le.rpm openvswitch-devel-2.9.0-70.el7fdp.1.ppc64le.rpm openvswitch-ovn-central-2.9.0-70.el7fdp.1.ppc64le.rpm openvswitch-ovn-common-2.9.0-70.el7fdp.1.ppc64le.rpm openvswitch-ovn-host-2.9.0-70.el7fdp.1.ppc64le.rpm openvswitch-ovn-vtep-2.9.0-70.el7fdp.1.ppc64le.rpm python-openvswitch-2.9.0-70.el7fdp.1.ppc64le.rpm x86_64: openvswitch-2.9.0-70.el7fdp.1.x86_64.rpm openvswitch-debuginfo-2.9.0-70.el7fdp.1.x86_64.rpm openvswitch-devel-2.9.0-70.el7fdp.1.x86_64.rpm openvswitch-ovn-central-2.9.0-70.el7fdp.1.x86_64.rpm openvswitch-ovn-common-2.9.0-70.el7fdp.1.x86_64.rpm openvswitch-ovn-host-2.9.0-70.el7fdp.1.x86_64.rpm openvswitch-ovn-vtep-2.9.0-70.el7fdp.1.x86_64.rpm python-openvswitch-2.9.0-70.el7fdp.1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2018-17204 https://access.redhat.com/security/cve/CVE-2018-17205 https://access.redhat.com/security/cve/CVE-2018-17206 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2018 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBW+BaCNzjgjWX9erEAQikXA/+OAaZIP3DWfdjyY8bMRbrRg9/VyGE3Go6 gS4wxrZh9yswHeG/RcTyfdWGceW/naWYC2fvPi+Vl8GRBoONNX76Z5bjkPx77/PF qUZpbNQG7aplbWkeuUIT1oWGDJ7Ax8Li0+zYBcr0MaOSiHJl5kOFsLYtYa/42WAg 9BgOeY+ZIJWrCNAFk6zGPGX/UejjZWuz/GJ7TL0V+W0XwvlPDZ4RCsmaCEBpYKrH R0SUmjl/fk3QCaMo77DfZeRLRPmFFNVYvIbx6OpZM/fA2neCpyBF6IkJF2KQbGoK JOTm85/ExVa2J6SO6LM6f/ZRhXciVZLPAYLvG/L/I4CWyyji8WEveNz+M3iHTooS hmqRw8msNBBogEQzke9KHVzuqQR14HhWs/lpeVI9KSh6fmkRnCpr3J764nNQhtHm f+ONma/8R0eqLsSSKoohQMrWy7WSAudDI9NriQwMAy0YqkRjCGZUOUR3A6jkaBFO MK6uaN1IhRG3h3JiNMuR5f4hVRaIPyGE7ltlbPzMyUcBBuWkk/Su/HOI2SitWO/Q fWQ00dttwLjtK73KiHHsskbFRLLE67DR+3AOQyC4lk9RLKN82kbfx8APly2Jr7Ec B9Q3AUpMArCK1kZy3VsWSNO48ECWpXPo2z7ZNZfF3veXDntYSF19ZkADstzYu2+Q Cb3Z9eM3UQQ= =Cdfr -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . Bug Fix(es): * Previously, the first packet of a new connection using an OVN logical router was used to discover the MAC address of the destination. This resulted in the loss of the first packet on the new connection. This enhancement adds the capability to correctly queue the first packet of a new connection, which prevents the loss of that packet. (BZ#1600115) 4. Bugs fixed (https://bugzilla.redhat.com/): 1600115 - ping loss of first packet with OVN l3 logical router. ========================================================================== Ubuntu Security Notice USN-3873-1 January 30, 2019 openvswitch vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 18.04 LTS - Ubuntu 16.04 LTS Summary: Several security issues were fixed in Open vSwitch. Software Description: - openvswitch: Ethernet virtual switch Details: It was discovered that Open vSwitch incorrectly decoded certain packets. (CVE-2018-17204) It was discovered that Open vSwitch incorrectly handled processing certain flows. This issue only affected Ubuntu 18.04 LTS. (CVE-2018-17206) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 18.04 LTS: openvswitch-common 2.9.2-0ubuntu0.18.04.3 Ubuntu 16.04 LTS: openvswitch-common 2.5.5-0ubuntu0.16.04.2 In general, a standard system update will make all the necessary changes

Trust: 2.34

sources: NVD: CVE-2018-17206 // JVNDB: JVNDB-2018-013987 // BID: 106675 // VULHUB: VHN-127642 // PACKETSTORM: 151187 // PACKETSTORM: 150175 // PACKETSTORM: 151190 // PACKETSTORM: 151402

AFFECTED PRODUCTS

vendor:redhatmodel:openstackscope:eqversion:10

Trust: 1.0

vendor:redhatmodel:openstackscope:eqversion:13

Trust: 1.0

vendor:openvswitchmodel:openvswitchscope:lteversion:2.7.6

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:18.04

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:16.04

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:9.0

Trust: 1.0

vendor:openvswitchmodel:openvswitchscope:gteversion:2.7.0

Trust: 1.0

vendor:canonicalmodel:ubuntuscope: - version: -

Trust: 0.8

vendor:open vswitchmodel:open vswitchscope:eqversion:2.7.6 for up to 2.7.x

Trust: 0.8

vendor:red hatmodel:openstackscope: - version: -

Trust: 0.8

vendor:red hatmodel:virtualizationscope: - version: -

Trust: 0.8

vendor:redhatmodel:virtualization managerscope:eqversion:4.2

Trust: 0.3

vendor:redhatmodel:virtualization for ibm power lescope:eqversion:4

Trust: 0.3

vendor:redhatmodel:virtualizationscope:eqversion:4

Trust: 0.3

vendor:redhatmodel:openstack platformscope:eqversion:9.0

Trust: 0.3

vendor:redhatmodel:openstack platformscope:eqversion:8.0

Trust: 0.3

vendor:redhatmodel:openstack platformscope:eqversion:13

Trust: 0.3

vendor:redhatmodel:openstack platformscope:eqversion:12

Trust: 0.3

vendor:redhatmodel:openstack platformscope:eqversion:10

Trust: 0.3

vendor:redhatmodel:openstack for ibm powerscope:eqversion:13

Trust: 0.3

vendor:redhatmodel:openstack director for rhelscope:eqversion:9.070

Trust: 0.3

vendor:redhatmodel:openstack director for rhelscope:eqversion:8.070

Trust: 0.3

vendor:redhatmodel:enterprise linux fast datapathscope:eqversion:7

Trust: 0.3

vendor:openvswitchmodel:openvswitchscope:eqversion:2.9.2

Trust: 0.3

vendor:openvswitchmodel:openvswitchscope:eqversion:2.9

Trust: 0.3

vendor:openvswitchmodel:openvswitchscope:eqversion:2.8.4

Trust: 0.3

vendor:openvswitchmodel:openvswitchscope:eqversion:2.8

Trust: 0.3

vendor:openvswitchmodel:openvswitchscope:eqversion:2.7.6

Trust: 0.3

vendor:openvswitchmodel:openvswitchscope:eqversion:2.7

Trust: 0.3

vendor:openvswitchmodel:openvswitchscope:eqversion:2.6.3

Trust: 0.3

vendor:openvswitchmodel:openvswitchscope:eqversion:2.6

Trust: 0.3

vendor:openvswitchmodel:openvswitchscope:eqversion:2.5.5

Trust: 0.3

vendor:openvswitchmodel:openvswitchscope:eqversion:2.5

Trust: 0.3

sources: BID: 106675 // JVNDB: JVNDB-2018-013987 // NVD: CVE-2018-17206

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-17206
value: MEDIUM

Trust: 1.0

NVD: CVE-2018-17206
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201809-880
value: MEDIUM

Trust: 0.6

VULHUB: VHN-127642
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2018-17206
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-127642
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-17206
baseSeverity: MEDIUM
baseScore: 4.9
vectorString: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 1.2
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2018-17206
baseSeverity: MEDIUM
baseScore: 4.9
vectorString: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-127642 // JVNDB: JVNDB-2018-013987 // CNNVD: CNNVD-201809-880 // NVD: CVE-2018-17206

PROBLEMTYPE DATA

problemtype:CWE-125

Trust: 1.9

sources: VULHUB: VHN-127642 // JVNDB: JVNDB-2018-013987 // NVD: CVE-2018-17206

THREAT TYPE

remote

Trust: 1.0

sources: PACKETSTORM: 151187 // PACKETSTORM: 150175 // PACKETSTORM: 151190 // PACKETSTORM: 151402 // CNNVD: CNNVD-201809-880

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-201809-880

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-013987

PATCH

title:ofp-actions: Avoid buffer overread in BUNDLE action decodingurl:https://github.com/openvswitch/ovs/commit/9237a63c47bd314b807cda0bd2216264e82edbe8

Trust: 0.8

title:Bug 1632528url:https://bugzilla.redhat.com/show_bug.cgi?id=1632528

Trust: 0.8

title:RHSA-2018:3500url:https://access.redhat.com/errata/RHSA-2018:3500

Trust: 0.8

title:RHSA-2019:0053url:https://access.redhat.com/errata/RHSA-2019:0053

Trust: 0.8

title:RHSA-2019:0081url:https://access.redhat.com/errata/RHSA-2019:0081

Trust: 0.8

title:USN-3873-1url:https://usn.ubuntu.com/3873-1/

Trust: 0.8

title:Open vSwitch Buffer error vulnerability fixurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=85001

Trust: 0.6

sources: JVNDB: JVNDB-2018-013987 // CNNVD: CNNVD-201809-880

EXTERNAL IDS

db:NVDid:CVE-2018-17206

Trust: 3.2

db:JVNDBid:JVNDB-2018-013987

Trust: 0.8

db:CNNVDid:CNNVD-201809-880

Trust: 0.7

db:AUSCERTid:ESB-2021.0639

Trust: 0.6

db:BIDid:106675

Trust: 0.3

db:VULHUBid:VHN-127642

Trust: 0.1

db:PACKETSTORMid:151187

Trust: 0.1

db:PACKETSTORMid:150175

Trust: 0.1

db:PACKETSTORMid:151190

Trust: 0.1

db:PACKETSTORMid:151402

Trust: 0.1

sources: VULHUB: VHN-127642 // BID: 106675 // JVNDB: JVNDB-2018-013987 // PACKETSTORM: 151187 // PACKETSTORM: 150175 // PACKETSTORM: 151190 // PACKETSTORM: 151402 // CNNVD: CNNVD-201809-880 // NVD: CVE-2018-17206

REFERENCES

url:https://access.redhat.com/errata/rhsa-2018:3500

Trust: 2.1

url:https://access.redhat.com/errata/rhsa-2019:0053

Trust: 2.1

url:https://access.redhat.com/errata/rhsa-2019:0081

Trust: 2.1

url:https://github.com/openvswitch/ovs/commit/9237a63c47bd314b807cda0bd2216264e82edbe8

Trust: 2.0

url:https://lists.debian.org/debian-lts-announce/2021/02/msg00032.html

Trust: 1.7

url:https://usn.ubuntu.com/3873-1/

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2018-17206

Trust: 1.2

url:https://bugzilla.redhat.com/show_bug.cgi?id=1632528

Trust: 0.9

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-17206

Trust: 0.8

url:https://access.redhat.com/security/cve/cve-2018-17206

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.0639

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2018-17205

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2018-17204

Trust: 0.4

url:http://openvswitch.org/

Trust: 0.3

url:https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=9052

Trust: 0.3

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2018-17205

Trust: 0.3

url:https://bugzilla.redhat.com/):

Trust: 0.3

url:https://access.redhat.com/security/team/key/

Trust: 0.3

url:https://access.redhat.com/articles/11258

Trust: 0.3

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2018-17204

Trust: 0.3

url:https://access.redhat.com/security/team/contact/

Trust: 0.3

url:https://launchpad.net/ubuntu/+source/openvswitch/2.9.2-0ubuntu0.18.04.3

Trust: 0.1

url:https://usn.ubuntu.com/usn/usn-3873-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/openvswitch/2.5.5-0ubuntu0.16.04.2

Trust: 0.1

sources: VULHUB: VHN-127642 // BID: 106675 // JVNDB: JVNDB-2018-013987 // PACKETSTORM: 151187 // PACKETSTORM: 150175 // PACKETSTORM: 151190 // PACKETSTORM: 151402 // CNNVD: CNNVD-201809-880 // NVD: CVE-2018-17206

CREDITS

ClusterFuzz-External

Trust: 0.3

sources: BID: 106675

SOURCES

db:VULHUBid:VHN-127642
db:BIDid:106675
db:JVNDBid:JVNDB-2018-013987
db:PACKETSTORMid:151187
db:PACKETSTORMid:150175
db:PACKETSTORMid:151190
db:PACKETSTORMid:151402
db:CNNVDid:CNNVD-201809-880
db:NVDid:CVE-2018-17206

LAST UPDATE DATE

2024-08-14T13:18:22.905000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-127642date:2020-10-15T00:00:00
db:BIDid:106675date:2018-09-25T00:00:00
db:JVNDBid:JVNDB-2018-013987date:2019-03-07T00:00:00
db:CNNVDid:CNNVD-201809-880date:2021-02-22T00:00:00
db:NVDid:CVE-2018-17206date:2021-08-04T17:14:46.777

SOURCES RELEASE DATE

db:VULHUBid:VHN-127642date:2018-09-19T00:00:00
db:BIDid:106675date:2018-09-25T00:00:00
db:JVNDBid:JVNDB-2018-013987date:2019-03-07T00:00:00
db:PACKETSTORMid:151187date:2019-01-17T00:03:15
db:PACKETSTORMid:150175date:2018-11-05T21:01:31
db:PACKETSTORMid:151190date:2019-01-17T00:14:02
db:PACKETSTORMid:151402date:2019-01-30T16:11:42
db:CNNVDid:CNNVD-201809-880date:2018-09-20T00:00:00
db:NVDid:CVE-2018-17206date:2018-09-19T16:29:01.113