Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat CodeReady Workspaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHSA-2019:0081 - Security Advisory
Issued:
2019-01-16
Updated:
2019-01-16

RHSA-2019:0081 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: openvswitch security and bug fix update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for openvswitch is now available for Red Hat OpenStack Platform 13.0 (Queens).

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

Open vSwitch provides standard network bridging functions and support for the OpenFlow protocol for remote per-flow control of traffic.

Security Fix(es):

  • openvswitch: Mishandle of group mods in lib/ofp-util.c:parse_group_prop_ntr_selection_method() allows for assertion failure (CVE-2018-17204)
  • openvswitch: Error during bundle commit in ofproto/ofproto.c:ofproto_rule_insert__() allows for crash (CVE-2018-17205)
  • openvswitch: Buffer over-read in lib/ofp-actions.c:decode_bundle() (CVE-2018-17206)

For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • Previously, the first packet of a new connection using an OVN logical router was used to discover the MAC address of the destination. This resulted in the loss of the first packet on the new connection. This

enhancement adds the capability to correctly queue the first packet of a new connection, which prevents the loss of that packet. (BZ#1600115)

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat OpenStack 13 x86_64
  • Red Hat OpenStack for IBM Power 13 ppc64le

Fixes

  • BZ - 1600115 - ping loss of first packet with OVN l3 logical router.
  • BZ - 1632522 - CVE-2018-17204 openvswitch: Mishandle of group mods in lib/ofp-util.c:parse_group_prop_ntr_selection_method() allows for assertion failure
  • BZ - 1632525 - CVE-2018-17205 openvswitch: Error during bundle commit in ofproto/ofproto.c:ofproto_rule_insert__() allows for crash
  • BZ - 1632528 - CVE-2018-17206 openvswitch: Buffer over-read in lib/ofp-actions.c:decode_bundle()
  • BZ - 1651453 - openvswitch package release request including the fix of RHBZ#1526306 for RHOSP13

CVEs

  • CVE-2018-17204
  • CVE-2018-17205
  • CVE-2018-17206

References

  • https://access.redhat.com/security/updates/classification/#moderate
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat OpenStack 13

SRPM
openvswitch-2.9.0-83.el7fdp.1.src.rpm SHA-256: 5e5acfda877928565b89f6b4305fa2b1e9713534bb75a2ee040017b6504cfdb9
x86_64
openvswitch-2.9.0-83.el7fdp.1.x86_64.rpm SHA-256: a7416ba617aa3a6e7ac3cf8c0e28ecdd0a0769205d24f6677f7d584c6e77be14
openvswitch-debuginfo-2.9.0-83.el7fdp.1.x86_64.rpm SHA-256: c85beee4884a1226fdf4842daa60607a323fc632d272b695eb6699f62886f9dd
openvswitch-ovn-central-2.9.0-83.el7fdp.1.x86_64.rpm SHA-256: ab994b72dfeb5a1593fe9662c0cb97a985ab0ef84f83c38d4c177bd00d74e10d
openvswitch-ovn-common-2.9.0-83.el7fdp.1.x86_64.rpm SHA-256: 89919bd9e648b4e1ef7b4104aa3ae8187a95b7deb35e50789382220ff5a27dee
openvswitch-ovn-host-2.9.0-83.el7fdp.1.x86_64.rpm SHA-256: b1529c301369009d01415956c137c28303ead60e5b9383ec00fec784f1461b13
openvswitch-ovn-vtep-2.9.0-83.el7fdp.1.x86_64.rpm SHA-256: e242bdcfeeee787f7b7f8d0cdf0f38d13396028acc1591fd368949c7e99cddcc
openvswitch-test-2.9.0-83.el7fdp.1.noarch.rpm SHA-256: 26e5e36128a33d2a06bfd712832d130e0997671ec599be5467df58e0755ac595
python-openvswitch-2.9.0-83.el7fdp.1.x86_64.rpm SHA-256: b6c076efc6f8891ba147f2b896e693b001f57a4ff884d46b65916d3be06a4f68

Red Hat OpenStack for IBM Power 13

SRPM
openvswitch-2.9.0-83.el7fdp.1.src.rpm SHA-256: 5e5acfda877928565b89f6b4305fa2b1e9713534bb75a2ee040017b6504cfdb9
ppc64le
openvswitch-2.9.0-83.el7fdp.1.ppc64le.rpm SHA-256: a216b407fb785d0eeccab7b52790bd562cd5ac533ada806692e33ee03890e264
openvswitch-debuginfo-2.9.0-83.el7fdp.1.ppc64le.rpm SHA-256: 413895aeddbfc260b36b1418408b0956c6a08a846a18ccf9a136335f64fc3c62
openvswitch-ovn-central-2.9.0-83.el7fdp.1.ppc64le.rpm SHA-256: 95f7d28cbd3c9039325e34c577f30b9d02e4f083cb3c98a91a9a054eee4d73e3
openvswitch-ovn-common-2.9.0-83.el7fdp.1.ppc64le.rpm SHA-256: aa7f8a673e79772e2b67dba372a635a70c33cd01b9fc88cbda053be012f63f02
openvswitch-ovn-host-2.9.0-83.el7fdp.1.ppc64le.rpm SHA-256: cefca91482fb2b6b25e65ade2696bb12f831ed49a3b268106e1616133707d189
openvswitch-ovn-vtep-2.9.0-83.el7fdp.1.ppc64le.rpm SHA-256: f02a29d0441c7872c40f0851da59f951af10994ae42b5a251c0439d6b78f3b8a
openvswitch-test-2.9.0-83.el7fdp.1.noarch.rpm SHA-256: 26e5e36128a33d2a06bfd712832d130e0997671ec599be5467df58e0755ac595
python-openvswitch-2.9.0-83.el7fdp.1.ppc64le.rpm SHA-256: 34d3741ddf30a436e7cc4ac0101639c9a64f902ebdb7f837f86a18fbb0520c4f

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2022 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter