CVE-2018-17204
Published: 19 September 2018
An issue was discovered in Open vSwitch (OvS) 2.7.x through 2.7.6, affecting parse_group_prop_ntr_selection_method in lib/ofp-util.c. When decoding a group mod, it validates the group type and command after the whole group mod has been decoded. The OF1.5 decoder, however, tries to use the type and command earlier, when it might still be invalid. This causes an assertion failure (via OVS_NOT_REACHED). ovs-vswitchd does not enable support for OpenFlow 1.5 by default.
Notes
Author | Note |
---|---|
mdeslaur | openflow 1.5 not enabled by default |
Priority
Status
Package | Release | Status |
---|---|---|
openvswitch Launchpad, Ubuntu, Debian |
bionic |
Released
(2.9.2-0ubuntu0.18.04.3)
|
cosmic |
Not vulnerable
(2.10.0-0ubuntu2)
|
|
trusty |
Does not exist
(trusty was not-affected [code not present])
|
|
upstream |
Needs triage
|
|
xenial |
Released
(2.5.5-0ubuntu0.16.04.2)
|
|
Patches: upstream: https://github.com/openvswitch/ovs/commit/9740d81d94888cb158fa99a9366fe2b32b3e4aaa (master) upstream: https://github.com/openvswitch/ovs/commit/8976ea1d680ab7a2d726a50e5666aa8fefd24168 (branch-2.8) upstream: https://github.com/openvswitch/ovs/commit/4af6da3b275b764b1afe194df6499b33d2bf4cde (branch-2.7) upstream: https://github.com/openvswitch/ovs/commit/0e6eb58f53d63b79d3a8c6936b0ef72cdd082bdb (2.9) upstream: https://github.com/openvswitch/ovs/commit/94b443070fea2a15bc4768c35d59d46892cdc901 (2.5) |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 4.3 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | Low |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | None |
Availability impact | Low |
Vector | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L |