First published: Wed Sep 19 2018(Updated: )
An issue was discovered in Open vSwitch (OvS) 2.7.x through 2.7.6, affecting ofproto_rule_insert__ in ofproto/ofproto.c. During bundle commit, flows that are added in a bundle are applied to ofproto in order. If a flow cannot be added (e.g., the flow action is a go-to for a group id that does not exist), OvS tries to revert back all previous flows that were successfully applied from the same bundle. This is possible since OvS maintains list of old flows that were replaced by flows from the bundle. While reinserting old flows, OvS has an assertion failure due to a check on rule state != RULE_INITIALIZED. This would work for new flows, but for an old flow the rule state is RULE_REMOVED. The assertion failure causes an OvS crash.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Openvswitch Openvswitch | >=2.7.0<=2.7.6 | |
Redhat Openstack | =10 | |
Redhat Openstack | =13 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
debian/openvswitch | 2.15.0+ds1-2+deb11u5 3.1.0-2+deb12u1 3.5.0~git20241129.2af7cef-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-17205 is a vulnerability in Open vSwitch (OvS) 2.7.x through 2.7.6 affecting ofproto_rule_insert__ function in ofproto/ofproto.c.
CVE-2018-17205 affects Open vSwitch by allowing attackers to add malicious flow actions that can cause denial of service or other impact.
The severity of CVE-2018-17205 is high, with a CVSS score of 7.5.
To fix CVE-2018-17205, update Open vSwitch to version 2.10.7, 2.15.0, 3.1.0, or 3.2.0 for Debian, or version 2.9.2 for Ubuntu 18.04.
You can find more information about CVE-2018-17205 in the following references: [Red Hat Security Advisory RHSA-2018:3500](https://access.redhat.com/errata/RHSA-2018:3500), [Red Hat Security Advisory RHSA-2019:0053](https://access.redhat.com/errata/RHSA-2019:0053), [Red Hat Security Advisory RHSA-2019:0081](https://access.redhat.com/errata/RHSA-2019:0081).