[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2018-17205Date: (C)2018-10-04   (M)2023-12-22


An issue was discovered in Open vSwitch (OvS) 2.7.x through 2.7.6, affecting ofproto_rule_insert__ in ofproto/ofproto.c. During bundle commit, flows that are added in a bundle are applied to ofproto in order. If a flow cannot be added (e.g., the flow action is a go-to for a group id that does not exist), OvS tries to revert back all previous flows that were successfully applied from the same bundle. This is possible since OvS maintains list of old flows that were replaced by flows from the bundle. While reinserting old flows, OvS has an assertion failure due to a check on rule state != RULE_INITIALIZED. This would work for new flows, but for an old flow the rule state is RULE_REMOVED. The assertion failure causes an OvS crash.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 7.5CVSS Score : 5.0
Exploit Score: 3.9Exploit Score: 10.0
Impact Score: 3.6Impact Score: 2.9
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: NETWORKAccess Vector: NETWORK
Attack Complexity: LOWAccess Complexity: LOW
Privileges Required: NONEAuthentication: NONE
User Interaction: NONEConfidentiality: NONE
Scope: UNCHANGEDIntegrity: NONE
Confidentiality: NONEAvailability: PARTIAL
Integrity: NONE 
Availability: HIGH 
  
Reference:
RHSA-2018:3500
RHSA-2019:0053
RHSA-2019:0081
USN-3873-1
https://github.com/openvswitch/ovs/commit/0befd1f3745055c32940f5faf9559be6a14395e6

CPE    3
cpe:/o:canonical:ubuntu_linux:18.04::~~lts~~~
cpe:/a:openvswitch:openvswitch
cpe:/o:canonical:ubuntu_linux:16.04::~~lts~~~
CWE    1
CWE-617
OVAL    4
oval:org.secpod.oval:def:2001244
oval:org.secpod.oval:def:89002547
oval:org.secpod.oval:def:50568
oval:org.secpod.oval:def:51033
...

© SecPod Technologies