Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2018:2598 - Security Advisory
Issued:
2018-08-29
Updated:
2018-08-29

RHSA-2018:2598 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: opendaylight security and bug fix update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for OpenDaylight is now available for Red Hat OpenStack Platform
13.0 (Queens).

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

Description

OpenDaylight (ODL) is a modular open platform for customizing and automating networks of any size and scale. The OpenDaylight Project arose out of the SDN movement, with a clear focus on network programmability.

Security Fix(es):

  • guava: Unbounded memory allocation in AtomicDoubleArray and CompoundOrdering classes allow remote attackers to cause a denial of service (CVE-2018-10237)

For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • Previously, when there are no DPNs associated with the controller, an Invalid dpnId, for example, zero, was selected as the NAPT Switch. Since the dpnId was zero, necessary flows for supporting external connectivity for VMs were missing in the pipeline. So VMs were unable to connect to internet.

Now, the Invalid dpnId is not chosen as an NAPT Switch and as soon as a new DPN is associated with the OpenDaylight controller, it will schedule the NAPT Switches for all the routers, that did not have the NAPT switch scheduled.
As a result, VMs are now able to reach internet. (BZ#1597304)

  • Some flows were missing from the ARP table and the flow programming generated an error due to a missing group. As a result, L2 failed and affected most of the traffic.

The flow programming now waits for the group to be added. The group is always present and L2 traffic succeeds. (BZ#1598399)

  • In OVS2.9, conntrack adds extra headers that the OpenFlow plugin cannot parse. As a result, traffic from the VM to a PNF on external network failed.

The extra headers are now explicit cleared. Traffic to PNF on external network does not fail. (BZ#1600608)

  • Some flows were missing from the SNAT table and the flow programming generated an error due to a missing group. As a result, SNAT traffic from compute, where the flow is missing, failed and affected most of the traffic.

As a result, the flow programming now waits for the group to be added. The group is always present and SNAT works. (BZ#1602404)

  • Previously, the transaction did not close in netvirt.vpnmanager.VpnOpStatusListener. This resulted in memory leaks at scale and/or in longevity. This issue has been resolved and now OpenDaylight requires less memory to run. (BZ#1607965)
  • Previously, the transaction did not close in netvirt.fibmanager.VrfEntryListener. This resulted in memory leaks at scale and/or in longevity. This issue has been resolved and OpenDaylight now requires less memory to run. (BZ#1585227)

Solution

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat OpenStack for IBM Power 13 ppc64le
  • Red Hat OpenStack 13 x86_64

Fixes

  • BZ - 1573391 - CVE-2018-10237 guava: Unbounded memory allocation in AtomicDoubleArray and CompoundOrdering classes allow remote attackers to cause a denial of service
  • BZ - 1585227 - [Infra] New transaction leak in netvirt.fibmanager.VrfEntryListener
  • BZ - 1597236 - [Netvirt] Tempest tests fail indicating FIP connectivity problems, vpnid=-1
  • BZ - 1597304 - [HA] Invalid dpnId configured as NAPT Switch in router-to-napt-switch model
  • BZ - 1598399 - [Netvirt] VM associated to vxlan network is not reachable because of ARP flow missing
  • BZ - 1600608 - [Netvirt] Traffic to the PNF from a VM without FIP fails
  • BZ - 1602187 - [Infra] New transaction leak in org.opendaylight.netvirt.natservice.internal.NatRouterInterfaceListener
  • BZ - 1602188 - [Infra] New Transaction leak in org.opendaylight.netvirt.vpnmanager.VpnInterfaceManager
  • BZ - 1602404 - [Netvirt] Sporadic failures Random ping failure in snat conntrack mode
  • BZ - 1607965 - [Infra] Transaction leak in org.opendaylight.netvirt.vpnmanager.VpnOpStatusListener
  • BZ - 1609383 - [Infra] UnknownSessionException when using odltools cluster monitoring tool
  • BZ - 1612057 - [Deployment] Latest 8.3.0-2 opendaylight RPM fails with because controller for switches is not set

CVEs

  • CVE-2018-10237

References

  • https://access.redhat.com/security/updates/classification/#moderate
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat OpenStack for IBM Power 13

SRPM
opendaylight-8.3.0-3.el7ost.src.rpm SHA-256: f98b095c5f7220791863356e11fc3115e984c2d5eb32d0c274004db16ca71319
ppc64le
opendaylight-8.3.0-3.el7ost.noarch.rpm SHA-256: 11604de61a8bfd78f13d0f5332b29ba56f63e067261671a4ec85a77b9d313d6d

Red Hat OpenStack 13

SRPM
opendaylight-8.3.0-3.el7ost.src.rpm SHA-256: f98b095c5f7220791863356e11fc3115e984c2d5eb32d0c274004db16ca71319
x86_64
opendaylight-8.3.0-3.el7ost.noarch.rpm SHA-256: 11604de61a8bfd78f13d0f5332b29ba56f63e067261671a4ec85a77b9d313d6d

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility