In Open vSwitch (OvS) 2.7.0, while parsing an OpenFlow role status message, there is a call to the abort() function for undefined role status reasons in the function `ofp_print_role_status_message` in `lib/ofp-print.c` that may be leveraged toward a remote DoS attack by a malicious switch.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2017:2698 | vendor advisory |
https://access.redhat.com/errata/RHSA-2017:2727 | vendor advisory |
https://access.redhat.com/errata/RHSA-2017:2692 | vendor advisory |
https://access.redhat.com/errata/RHSA-2017:2553 | vendor advisory |
https://access.redhat.com/errata/RHSA-2017:2418 | vendor advisory |
https://access.redhat.com/errata/RHSA-2017:2648 | vendor advisory |
https://access.redhat.com/errata/RHSA-2017:2665 | vendor advisory |
https://mail.openvswitch.org/pipermail/ovs-dev/2017-May/332966.html | mailing list patch vendor advisory |