First published: Tue Sep 25 2018(Updated: )
An issue was discovered in Open vSwitch (OvS) 2.7.x through 2.7.6, affecting parse_group_prop_ntr_selection_method in lib/ofp-util.c. When decoding a group mod, it validates the group type and command after the whole group mod has been decoded. The OF1.5 decoder, however, tries to use the type and command earlier, when it might still be invalid. This causes an assertion failure (via OVS_NOT_REACHED). ovs-vswitchd does not enable support for OpenFlow 1.5 by default. Upstream Patch: <a href="https://github.com/openvswitch/ovs/commit/4af6da3b275b764b1afe194df6499b33d2bf4cde">https://github.com/openvswitch/ovs/commit/4af6da3b275b764b1afe194df6499b33d2bf4cde</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Open vSwitch | >=2.7.x<2.7.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1632522 has been classified as moderate.
To fix REDHAT-BUG-1632522, update Open vSwitch to version 2.7.7 or later.
Open vSwitch versions from 2.7.x through 2.7.6 are affected by REDHAT-BUG-1632522.
The vulnerability impacts the parse_group_prop_ntr_selection_method function in lib/ofp-util.c.
There is no official workaround for REDHAT-BUG-1632522; updating to a patched version is recommended.