First published: Thu Jan 11 2018(Updated: )
It was found that all the flows, including active and inactive, in the config datastore are installed back in switch upon reconnection, as part of the node reconciliation process in OpenDayLight. This may lead to denial of service via table overflow or possibly circumventiagn of controller's control.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenDaylight | <=carbon | |
OpenDaylight | =sp1 | |
OpenDaylight | =sp2 | |
OpenDaylight | =sp3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1078 is classified as a high severity vulnerability due to its potential to cause denial of service.
To mitigate CVE-2018-1078, you should upgrade to the latest version of OpenDaylight that addresses this issue.
CVE-2018-1078 affects OpenDaylight versions up to and including carbon, as well as specific SP1, SP2, and SP3 releases.
The risks associated with CVE-2018-1078 include table overflow and potential circumvention of the controller's control.
Yes, patches to fix CVE-2018-1078 are available in the updated versions of OpenDaylight.