Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2019:0053 - Security Advisory
Issued:
2019-01-16
Updated:
2019-01-16

RHSA-2019:0053 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: openvswitch security and bug fix update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for openvswitch is now available for Red Hat OpenStack Platform 10.0 (Newton).

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

Open vSwitch provides standard network bridging functions and support for the OpenFlow protocol for remote per-flow control of traffic.

Security Fix(es):

  • openvswitch: Mishandle of group mods in lib/ofp-util.c:parse_group_prop_ntr_selection_method() allows for assertion failure (CVE-2018-17204)
  • openvswitch: Error during bundle commit in ofproto/ofproto.c:ofproto_rule_insert__() allows for crash (CVE-2018-17205)
  • openvswitch: Buffer over-read in lib/ofp-actions.c:decode_bundle() (CVE-2018-17206)

For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat OpenStack 10 x86_64

Fixes

  • BZ - 1632522 - CVE-2018-17204 openvswitch: Mishandle of group mods in lib/ofp-util.c:parse_group_prop_ntr_selection_method() allows for assertion failure
  • BZ - 1632525 - CVE-2018-17205 openvswitch: Error during bundle commit in ofproto/ofproto.c:ofproto_rule_insert__() allows for crash
  • BZ - 1632528 - CVE-2018-17206 openvswitch: Buffer over-read in lib/ofp-actions.c:decode_bundle()
  • BZ - 1644383 - Issues with LACP failover - frames dropped in OVS DPDK 2.9 with OSP 10
  • BZ - 1651454 - openvswitch package release request including the fix of RHBZ#1526306 for RHOSP10

CVEs

  • CVE-2018-17204
  • CVE-2018-17205
  • CVE-2018-17206

References

  • https://access.redhat.com/security/updates/classification/#moderate
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat OpenStack 10

SRPM
openvswitch-2.9.0-83.el7fdp.1.src.rpm SHA-256: 5e5acfda877928565b89f6b4305fa2b1e9713534bb75a2ee040017b6504cfdb9
x86_64
openvswitch-2.9.0-83.el7fdp.1.x86_64.rpm SHA-256: a7416ba617aa3a6e7ac3cf8c0e28ecdd0a0769205d24f6677f7d584c6e77be14
openvswitch-debuginfo-2.9.0-83.el7fdp.1.x86_64.rpm SHA-256: c85beee4884a1226fdf4842daa60607a323fc632d272b695eb6699f62886f9dd
openvswitch-devel-2.9.0-83.el7fdp.1.x86_64.rpm SHA-256: 9034d0e6b95942f79a49d5a044be5abb9f6a0f86a51076ab280065732bde48b1
openvswitch-ovn-central-2.9.0-83.el7fdp.1.x86_64.rpm SHA-256: ab994b72dfeb5a1593fe9662c0cb97a985ab0ef84f83c38d4c177bd00d74e10d
openvswitch-ovn-common-2.9.0-83.el7fdp.1.x86_64.rpm SHA-256: 89919bd9e648b4e1ef7b4104aa3ae8187a95b7deb35e50789382220ff5a27dee
openvswitch-ovn-host-2.9.0-83.el7fdp.1.x86_64.rpm SHA-256: b1529c301369009d01415956c137c28303ead60e5b9383ec00fec784f1461b13
openvswitch-ovn-vtep-2.9.0-83.el7fdp.1.x86_64.rpm SHA-256: e242bdcfeeee787f7b7f8d0cdf0f38d13396028acc1591fd368949c7e99cddcc
openvswitch-test-2.9.0-83.el7fdp.1.noarch.rpm SHA-256: 26e5e36128a33d2a06bfd712832d130e0997671ec599be5467df58e0755ac595
python-openvswitch-2.9.0-83.el7fdp.1.x86_64.rpm SHA-256: b6c076efc6f8891ba147f2b896e693b001f57a4ff884d46b65916d3be06a4f68

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility