Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1497966 - (CVE-2017-14970) CVE-2017-14970 openvswitch: Multiple memory leaks in lib/ofp-util.c while parsing malformed OpenFlow group mod messages
CVE-2017-14970 openvswitch: Multiple memory leaks in lib/ofp-util.c while par...
Status: CLOSED NOTABUG
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
impact=low,public=20170921,reported=2...
: Security
Depends On: 1497967 1499033 1499034
Blocks: 1497969
  Show dependency treegraph
 
Reported: 2017-10-03 05:06 EDT by Andrej Nemec
Modified: 2017-10-25 11:22 EDT (History)
41 users (show)

See Also:
Fixed In Version: openvswitch 2.8.1
Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2017-10-05 18:04:51 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Andrej Nemec 2017-10-03 05:06:13 EDT
In lib/ofp-util.c in Open vSwitch (OvS) before 2.8.1, there are multiple memory leaks while parsing malformed OpenFlow group mod messages. An attacker can use this for a Denial of Service.

Upstream fixes:

https://github.com/openvswitch/ovs/commit/77ad4225d125030420d897c873e4734ac708c66b
https://github.com/openvswitch/ovs/commit/f673f4059717dc9d2d6dd2d4db52be1149a996dd
Comment 1 Andrej Nemec 2017-10-03 05:07:02 EDT
Created openvswitch tracking bugs for this issue:

Affects: fedora-all [bug 1497967]
Comment 2 Joshua Padman 2017-10-05 00:28:55 EDT
Analysis: Currently when parsing group mod messages, particularly group descriptor messages and those that contain buckets, the buckets will be loaded into memory. If for some reason the parsing fails and the function returns an error the references to the buckets already allocated is lost (memory leak).
Openflow being what it is, a standard for managing switches from a centralised control plane it is unlikely that those not already in a significant position to abuse / DoS the service would be able to use these vulnerabilities. As it stands the two memory leaks require failures in the parsing of the group descriptor, to systematically cause this failure and create a denial of service (memory exhaustion etc) would be difficult.
Comment 5 Joshua Padman 2017-10-05 17:33:26 EDT
Relevant information for others:

Ben Pfaff downgraded the severity of this bug: https://mail.openvswitch.org/pipermail/ovs-dev/2017-October/339432.html
Comment 6 Joshua Padman 2017-10-05 18:04:51 EDT
Upstream is applying to have the CVE rejected, which we agree with. After some consideration we are closing it as notabug.
https://mail.openvswitch.org/pipermail/ovs-dev/2017-October/339435.html
Comment 7 Junhan 2017-10-25 05:26:38 EDT
Hi Andrej,
Do you have the reproducer of this bug?
Thanks,
Junhan
Comment 8 Andrej Nemec 2017-10-25 11:22:38 EDT
(In reply to Junhan from comment #7)
> Hi Andrej,
> Do you have the reproducer of this bug?
> Thanks,
> Junhan

Hello Junhan, there is no reproducer as far as I'm aware of. This issue has also been rejected as a security issue.

Note You need to log in before you can comment on or make changes to this bug.