First published: Thu Jan 11 2018(Updated: )
It was found that all the flows, including active and inactive, in the config datastore are installed back in switch upon reconnection, as part of the node reconciliation process in OpenDayLight. This may lead to denial of service via table overflow or possibly circumventiagn of controller's control.
Affected Software | Affected Version | How to fix |
---|---|---|
OpenDaylight |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1533501 is high due to the potential for denial of service through table overflow.
Fixing REDHAT-BUG-1533501 involves updating to a patched version of OpenDaylight that addresses the flow reconciliation issue.
REDHAT-BUG-1533501 affects all flows in the config datastore within the OpenDaylight framework.
The main issue with REDHAT-BUG-1533501 is that it can lead to a denial of service by causing an overflow in the switch's flow table.
Yes, REDHAT-BUG-1533501 can potentially be exploited remotely due to incorrect handling of flow installations upon reconnection.