{ "Definition": [ { "ID": "oval:org.altlinux.errata:def:20182159", "Version": "oval:org.altlinux.errata:def:20182159", "Class": "patch", "Metadata": { "Title": "ALT-PU-2018-2159: package `openvswitch` update to version 2.9.2-alt1.S1", "AffectedList": [ { "Family": "unix", "Platforms": [ "ALT Linux branch p10" ], "Products": [ "ALT Server", "ALT Virtualization Server", "ALT Workstation", "ALT Workstation K", "ALT Education", "Simply Linux", "Starterkit" ] } ], "References": [ { "RefID": "ALT-PU-2018-2159", "RefURL": "https://errata.altlinux.org/ALT-PU-2018-2159", "Source": "ALTPU" }, { "RefID": "BDU:2019-00706", "RefURL": "https://bdu.fstec.ru/vul/2019-00706", "Source": "BDU" }, { "RefID": "BDU:2019-01418", "RefURL": "https://bdu.fstec.ru/vul/2019-01418", "Source": "BDU" }, { "RefID": "BDU:2019-01419", "RefURL": "https://bdu.fstec.ru/vul/2019-01419", "Source": "BDU" }, { "RefID": "CVE-2017-14970", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-14970", "Source": "CVE" }, { "RefID": "CVE-2018-17204", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-17204", "Source": "CVE" }, { "RefID": "CVE-2018-17205", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-17205", "Source": "CVE" }, { "RefID": "CVE-2018-17206", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-17206", "Source": "CVE" } ], "Description": "This update upgrades openvswitch to version 2.9.2-alt1.S1. \nSecurity Fix(es):\n\n * BDU:2019-00706: Уязвимость метода parse_group_prop_ntr_selection_method программного многоуровневого коммутатора Open vSwitch, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-01418: Уязвимость функции decode_bundle() программного многоуровневого коммутатора Open vSwitch, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-01419: Уязвимость функции ofproto_rule_insert__() программного многоуровневого коммутатора Open vSwitch, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2017-14970: In lib/ofp-util.c in Open vSwitch (OvS) before 2.8.1, there are multiple memory leaks while parsing malformed OpenFlow group mod messages. NOTE: the vendor disputes the relevance of this report, stating \"it can only be triggered by an OpenFlow controller, but OpenFlow controllers have much more direct and powerful ways to force Open vSwitch to allocate memory, such as by inserting flows into the flow table.\"\n\n * CVE-2018-17204: An issue was discovered in Open vSwitch (OvS) 2.7.x through 2.7.6, affecting parse_group_prop_ntr_selection_method in lib/ofp-util.c. When decoding a group mod, it validates the group type and command after the whole group mod has been decoded. The OF1.5 decoder, however, tries to use the type and command earlier, when it might still be invalid. This causes an assertion failure (via OVS_NOT_REACHED). ovs-vswitchd does not enable support for OpenFlow 1.5 by default.\n\n * CVE-2018-17205: An issue was discovered in Open vSwitch (OvS) 2.7.x through 2.7.6, affecting ofproto_rule_insert__ in ofproto/ofproto.c. During bundle commit, flows that are added in a bundle are applied to ofproto in order. If a flow cannot be added (e.g., the flow action is a go-to for a group id that does not exist), OvS tries to revert back all previous flows that were successfully applied from the same bundle. This is possible since OvS maintains list of old flows that were replaced by flows from the bundle. While reinserting old flows, OvS has an assertion failure due to a check on rule state != RULE_INITIALIZED. This would work for new flows, but for an old flow the rule state is RULE_REMOVED. The assertion failure causes an OvS crash.\n\n * CVE-2018-17206: An issue was discovered in Open vSwitch (OvS) 2.7.x through 2.7.6. The decode_bundle function inside lib/ofp-actions.c is affected by a buffer over-read issue during BUNDLE action decoding.", "Advisory": { "From": "errata.altlinux.org", "Severity": "High", "Rights": "Copyright 2024 BaseALT Ltd.", "Issued": { "Date": "2018-08-15" }, "Updated": { "Date": "2018-08-15" }, "BDUs": [ { "ID": "BDU:2019-00706", "CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "CWE": "CWE-79", "Href": "https://bdu.fstec.ru/vul/2019-00706", "Impact": "Low", "Public": "20180919" }, { "ID": "BDU:2019-01418", "CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "CWE": "CWE-125", "Href": "https://bdu.fstec.ru/vul/2019-01418", "Impact": "Low", "Public": "20180919" }, { "ID": "BDU:2019-01419", "CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "CWE": "CWE-20", "Href": "https://bdu.fstec.ru/vul/2019-01419", "Impact": "High", "Public": "20180919" } ], "CVEs": [ { "ID": "CVE-2017-14970", "CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "CVSS3": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "CWE": "CWE-772", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-14970", "Impact": "Low", "Public": "20171002" }, { "ID": "CVE-2018-17204", "CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "CWE": "CWE-617", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-17204", "Impact": "Low", "Public": "20180919" }, { "ID": "CVE-2018-17205", "CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "CWE": "CWE-617", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-17205", "Impact": "High", "Public": "20180919" }, { "ID": "CVE-2018-17206", "CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "CWE": "CWE-125", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-17206", "Impact": "Low", "Public": "20180919" } ], "AffectedCPEs": { "CPEs": [ "cpe:/o:alt:kworkstation:10", "cpe:/o:alt:workstation:10", "cpe:/o:alt:server:10", "cpe:/o:alt:server-v:10", "cpe:/o:alt:education:10", "cpe:/o:alt:slinux:10", "cpe:/o:alt:starterkit:p10", "cpe:/o:alt:kworkstation:10.1", "cpe:/o:alt:workstation:10.1", "cpe:/o:alt:server:10.1", "cpe:/o:alt:server-v:10.1", "cpe:/o:alt:education:10.1", "cpe:/o:alt:slinux:10.1", "cpe:/o:alt:starterkit:10.1", "cpe:/o:alt:kworkstation:10.2", "cpe:/o:alt:workstation:10.2", "cpe:/o:alt:server:10.2", "cpe:/o:alt:server-v:10.2", "cpe:/o:alt:education:10.2", "cpe:/o:alt:slinux:10.2", "cpe:/o:alt:starterkit:10.2" ] } } }, "Criteria": { "Operator": "AND", "Criterions": [ { "TestRef": "oval:org.altlinux.errata:tst:2001", "Comment": "ALT Linux must be installed" } ], "Criterias": [ { "Operator": "OR", "Criterions": [ { "TestRef": "oval:org.altlinux.errata:tst:20182159001", "Comment": "bash-completion-openvswitch is earlier than 0:2.9.2-alt1.S1" }, { "TestRef": "oval:org.altlinux.errata:tst:20182159002", "Comment": "openvswitch is earlier than 0:2.9.2-alt1.S1" }, { "TestRef": "oval:org.altlinux.errata:tst:20182159003", "Comment": "openvswitch-common is earlier than 0:2.9.2-alt1.S1" }, { "TestRef": "oval:org.altlinux.errata:tst:20182159004", "Comment": "openvswitch-debugtools is earlier than 0:2.9.2-alt1.S1" }, { "TestRef": "oval:org.altlinux.errata:tst:20182159005", "Comment": "openvswitch-devel is earlier than 0:2.9.2-alt1.S1" }, { "TestRef": "oval:org.altlinux.errata:tst:20182159006", "Comment": "openvswitch-ovn-central is earlier than 0:2.9.2-alt1.S1" }, { "TestRef": "oval:org.altlinux.errata:tst:20182159007", "Comment": "openvswitch-ovn-common is earlier than 0:2.9.2-alt1.S1" }, { "TestRef": "oval:org.altlinux.errata:tst:20182159008", "Comment": "openvswitch-ovn-docker is earlier than 0:2.9.2-alt1.S1" }, { "TestRef": "oval:org.altlinux.errata:tst:20182159009", "Comment": "openvswitch-ovn-host is earlier than 0:2.9.2-alt1.S1" }, { "TestRef": "oval:org.altlinux.errata:tst:20182159010", "Comment": "openvswitch-ovn-vtep is earlier than 0:2.9.2-alt1.S1" }, { "TestRef": "oval:org.altlinux.errata:tst:20182159011", "Comment": "openvswitch-vtep is earlier than 0:2.9.2-alt1.S1" }, { "TestRef": "oval:org.altlinux.errata:tst:20182159012", "Comment": "python-module-openvswitch is earlier than 0:2.9.2-alt1.S1" }, { "TestRef": "oval:org.altlinux.errata:tst:20182159013", "Comment": "python3-module-openvswitch is earlier than 0:2.9.2-alt1.S1" } ] } ] } } ] }