First published: Wed Sep 19 2018(Updated: )
An issue was discovered in Open vSwitch (OvS) 2.7.x through 2.7.6, affecting parse_group_prop_ntr_selection_method in lib/ofp-util.c. When decoding a group mod, it validates the group type and command after the whole group mod has been decoded. The OF1.5 decoder, however, tries to use the type and command earlier, when it might still be invalid. This causes an assertion failure (via OVS_NOT_REACHED). ovs-vswitchd does not enable support for OpenFlow 1.5 by default.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Openvswitch Openvswitch | >=2.7.0<=2.7.6 | |
Redhat Openstack | =10 | |
Redhat Openstack | =13 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Debian Debian Linux | =9.0 | |
debian/openvswitch | 2.15.0+ds1-2+deb11u5 3.1.0-2+deb12u1 3.4.0-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-17204 is medium with a CVSS score of 4.3.
The affected software for CVE-2018-17204 includes Open vSwitch versions up to and including 2.7.6, Debian Openvswitch, Redhat Openstack versions 10 and 13, and Canonical Ubuntu Linux versions 16.04 and 18.04.
To fix CVE-2018-17204, you should update to Open vSwitch version 2.10.7+ds1-0+deb10u1 or later, or version 2.9.2-0ubuntu0.18.04.3 or later.
You can find more information about CVE-2018-17204 on the Red Hat Security Advisories: RHSA-2018:3500, RHSA-2019:0053, and RHSA-2019:0081.
The Common Weakness Enumeration (CWE) identifier for CVE-2018-17204 is CWE-617.