Executive Summary

Summary
Title openvswitch2.11 security and bug fix update
Informations
Name RHSA-2020:0171 First vendor Publication 2020-01-22
Vendor RedHat Last vendor Modification 2020-01-22
Severity (Vendor) N/A Revision 01

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Overall CVSS Score 7.5
Base Score 7.5 Environmental Score 7.5
impact SubScore 3.6 Temporal Score 7.5
Exploitabality Sub Score 3.9
 
Attack Vector Network Attack Complexity Low
Privileges Required None User Interaction None
Scope Unchanged Confidentiality Impact None
Integrity Impact None Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P)
Cvss Base Score 5 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Problem Description:

An update for openvswitch2.11 is now available for Fast Datapath for RHEL 8.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Channel to provide early releases to layered products - noarch, ppc64le, s390x, x86_64

3. Description:

Open vSwitch provides standard network bridging functions and support for the OpenFlow protocol for remote per-flow control of traffic.

Security Fix(es):

* dpdk: possible memory leak leads to denial of service (CVE-2019-14818)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* SyntaxError: Missing parentheses in call to 'print' (BZ#1751161)

* [ovsdb-server] Allow replicating from older schema servers (BZ#1760763)

* ovs-tcpundump doesn't work well on special packet (BZ#1764125)

* ovs-tcpundump -V won't exit (BZ#1764127)

* measure the time needed by ovn-controller to resync to a new SB db (BZ#1780729)

* [ovs2.11] SSL connections drops are constantly logged in ovsdb-server-nb.log (BZ#1780747)

4. Solution:

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1737327 - CVE-2019-14818 dpdk: possible memory leak leads to denial of service 1751161 - SyntaxError: Missing parentheses in call to 'print' 1760763 - [ovsdb-server] Allow replicating from older schema servers 1764125 - ovs-tcpundump doesn't work well on special packet 1764127 - ovs-tcpundump -V won't exit 1780729 - measure the time needed by ovn-controller to resync to a new SB db 1780747 - [ovs2.11] SSL connections drops are constantly logged in ovsdb-server-nb.log

Original Source

Url : https://rhn.redhat.com/errata/RHSA-2020-0171.html

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-401 Failure to Release Memory Before Removing Last Reference ('Memory Leak')

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1
Application 2
Application 1
Application 1
Os 1

Alert History

If you want to see full details history, please login or register.
0
1
Date Informations
2020-05-23 13:03:45
  • Multiple Updates
2020-03-19 13:19:52
  • First insertion