In Open vSwitch while parsing an OpenFlow role status message, there is a call to the abort() function for undefined role status reasons in the function `ofp_print_role_status_message` in `lib/ofp-print.c` that may be leveraged toward a remote DoS attack by a malicious switch. References: https://mail.openvswitch.org/pipermail/ovs-dev/2017-May/332966.html
Created openvswitch tracking bugs for this issue: Affects: fedora-all [bug 1456797]
This issue has been addressed in the following products: Fast Datapath for RHEL 7 Via RHSA-2017:2418 https://access.redhat.com/errata/RHSA-2017:2418
This issue has been addressed in the following products: Red Hat OpenStack Platform 9.0 (Mitaka) Via RHSA-2017:2553 https://access.redhat.com/errata/RHSA-2017:2553
This issue has been addressed in the following products: Red Hat OpenStack Platform 10.0 (Newton) Via RHSA-2017:2648 https://access.redhat.com/errata/RHSA-2017:2648
This issue has been addressed in the following products: Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7 Via RHSA-2017:2665 https://access.redhat.com/errata/RHSA-2017:2665
This issue has been addressed in the following products: Red Hat OpenStack Platform 8.0 (Liberty) Via RHSA-2017:2692 https://access.redhat.com/errata/RHSA-2017:2692
This issue has been addressed in the following products: Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7 Via RHSA-2017:2698 https://access.redhat.com/errata/RHSA-2017:2698
This issue has been addressed in the following products: Red Hat OpenStack Platform 11.0 (Ocata) Via RHSA-2017:2727 https://access.redhat.com/errata/RHSA-2017:2727
Updated fixed in version to 2.7.2-1 based on packages released in https://access.redhat.com/errata/RHSA-2017:2418. Openshift Enterprise 3.7 uses the fixed version 2.7.2-1. Marking as not affected.