![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
CVE ID: | CVE-2018-17204 |
Description: | An issue was discovered in Open vSwitch (OvS) 2.7.x through 2.7.6, affecting parse_group_prop_ntr_selection_method in lib/ofp-util.c. When decoding a group mod, it validates the group type and command after the whole group mod has been decoded. The OF1.5 decoder, however, tries to use the type and command earlier, when it might still be invalid. This causes an assertion failure (via OVS_NOT_REACHED). ovs-vswitchd does not enable support for OpenFlow 1.5 by default. |
Test IDs: | 1.3.6.1.4.1.25623.1.0.892571 |
Cross References: |
Common Vulnerability Exposure (CVE) ID: CVE-2018-17204 https://github.com/openvswitch/ovs/commit/4af6da3b275b764b1afe194df6499b33d2bf4cde https://lists.debian.org/debian-lts-announce/2021/02/msg00032.html RedHat Security Advisories: RHSA-2018:3500 https://access.redhat.com/errata/RHSA-2018:3500 RedHat Security Advisories: RHSA-2019:0053 https://access.redhat.com/errata/RHSA-2019:0053 RedHat Security Advisories: RHSA-2019:0081 https://access.redhat.com/errata/RHSA-2019:0081 https://usn.ubuntu.com/3873-1/ |