-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================                   Red Hat Security Advisory

Synopsis:          Moderate: openvswitch security and bug fix update
Advisory ID:       RHSA-2018:2524-01
Product:           Red Hat Enterprise Linux OpenStack Platform
Advisory URL:      https://access.redhat.com/errata/RHSA-2018:2524
Issue date:        2018-08-20
CVE Names:         CVE-2018-1059 
====================================================================
1. Summary:

An update for openvswitch is now available for Red Hat OpenStack Platform
12.0 (Pike).

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

OpenStack 12.0 Tools for RHEL 7 - noarch
Red Hat OpenStack Platform 12.0 - noarch, ppc64le, x86_64

3. Description:

Open vSwitch provides standard network bridging functions and support for
the OpenFlow protocol for remote per-flow control of traffic.

Security Fix(es):

* dpdk: Information exposure in unchecked guest physical to host virtual
address translations (CVE-2018-1059)

For more details about the security issue(s), including the impact, a CVSS
score, and other related information, refer to the CVE page(s) listed in
the References section.

This issue was discovered by Maxime Coquelin (Red Hat).

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1544298 - CVE-2018-1059 dpdk: Information exposure in unchecked guest physical to host virtual address translations
1547518 - Need an openvswitch-test package that can be installed along with python-openvswitch from OSP repo [openstack-12]
1561969 - Backport from master OVS for "LACP: check active partner sys id"
1583749 - openvswitch-2.9.0-19.el7fdp installs /var/log/openvswitch with permissions 0755 [openstack-12]

6. Package List:

Red Hat OpenStack Platform 12.0:

Source:
openvswitch-2.9.0-19.el7fdp.1.src.rpm

noarch:
python-openvswitch-2.9.0-19.el7fdp.1.noarch.rpm

ppc64le:
openvswitch-2.9.0-19.el7fdp.1.ppc64le.rpm
openvswitch-debuginfo-2.9.0-19.el7fdp.1.ppc64le.rpm
openvswitch-ovn-central-2.9.0-19.el7fdp.1.ppc64le.rpm
openvswitch-ovn-common-2.9.0-19.el7fdp.1.ppc64le.rpm
openvswitch-ovn-host-2.9.0-19.el7fdp.1.ppc64le.rpm
openvswitch-ovn-vtep-2.9.0-19.el7fdp.1.ppc64le.rpm

x86_64:
openvswitch-2.9.0-19.el7fdp.1.x86_64.rpm
openvswitch-debuginfo-2.9.0-19.el7fdp.1.x86_64.rpm
openvswitch-ovn-central-2.9.0-19.el7fdp.1.x86_64.rpm
openvswitch-ovn-common-2.9.0-19.el7fdp.1.x86_64.rpm
openvswitch-ovn-host-2.9.0-19.el7fdp.1.x86_64.rpm
openvswitch-ovn-vtep-2.9.0-19.el7fdp.1.x86_64.rpm

OpenStack 12.0 Tools for RHEL 7:

noarch:
openvswitch-test-2.9.0-19.el7fdp.1.noarch.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2018-1059
https://access.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2018 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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gfIU
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2018-2524:01 Moderate: openvswitch security and bug fix update

An update for openvswitch is now available for Red Hat OpenStack Platform 12.0 (Pike)

Summary

Open vSwitch provides standard network bridging functions and support for the OpenFlow protocol for remote per-flow control of traffic.
Security Fix(es):
* dpdk: Information exposure in unchecked guest physical to host virtual address translations (CVE-2018-1059)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
This issue was discovered by Maxime Coquelin (Red Hat).



Summary


Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258

References

https://access.redhat.com/security/cve/CVE-2018-1059 https://access.redhat.com/security/updates/classification/#moderate

Package List

Red Hat OpenStack Platform 12.0:
Source: openvswitch-2.9.0-19.el7fdp.1.src.rpm
noarch: python-openvswitch-2.9.0-19.el7fdp.1.noarch.rpm
ppc64le: openvswitch-2.9.0-19.el7fdp.1.ppc64le.rpm openvswitch-debuginfo-2.9.0-19.el7fdp.1.ppc64le.rpm openvswitch-ovn-central-2.9.0-19.el7fdp.1.ppc64le.rpm openvswitch-ovn-common-2.9.0-19.el7fdp.1.ppc64le.rpm openvswitch-ovn-host-2.9.0-19.el7fdp.1.ppc64le.rpm openvswitch-ovn-vtep-2.9.0-19.el7fdp.1.ppc64le.rpm
x86_64: openvswitch-2.9.0-19.el7fdp.1.x86_64.rpm openvswitch-debuginfo-2.9.0-19.el7fdp.1.x86_64.rpm openvswitch-ovn-central-2.9.0-19.el7fdp.1.x86_64.rpm openvswitch-ovn-common-2.9.0-19.el7fdp.1.x86_64.rpm openvswitch-ovn-host-2.9.0-19.el7fdp.1.x86_64.rpm openvswitch-ovn-vtep-2.9.0-19.el7fdp.1.x86_64.rpm
OpenStack 12.0 Tools for RHEL 7:
noarch: openvswitch-test-2.9.0-19.el7fdp.1.noarch.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/


Severity
Advisory ID: RHSA-2018:2524-01
Product: Red Hat Enterprise Linux OpenStack Platform
Advisory URL: https://access.redhat.com/errata/RHSA-2018:2524
Issued Date: : 2018-08-20
CVE Names: CVE-2018-1059

Topic

An update for openvswitch is now available for Red Hat OpenStack Platform12.0 (Pike).Red Hat Product Security has rated this update as having a security impactof Moderate. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available for each vulnerability fromthe CVE link(s) in the References section.


Topic


 

Relevant Releases Architectures

OpenStack 12.0 Tools for RHEL 7 - noarch

Red Hat OpenStack Platform 12.0 - noarch, ppc64le, x86_64


Bugs Fixed

1544298 - CVE-2018-1059 dpdk: Information exposure in unchecked guest physical to host virtual address translations

1547518 - Need an openvswitch-test package that can be installed along with python-openvswitch from OSP repo [openstack-12]

1561969 - Backport from master OVS for "LACP: check active partner sys id"

1583749 - openvswitch-2.9.0-19.el7fdp installs /var/log/openvswitch with permissions 0755 [openstack-12]


Related News