<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:cpe="http://cpe.mitre.org/language/2.0" xmlns:cvrf="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf" xmlns:cvrf-common="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/common" xmlns:cvssv2="http://scap.nist.gov/schema/cvss-v2/1.0" xmlns:cvssv3="https://www.first.org/cvss/cvss-v3.0.xsd" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:ns0="http://purl.org/dc/elements/1.1/" xmlns:prod="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/prod" xmlns:scap-core="http://scap.nist.gov/schema/scap-core/1.0" xmlns:sch="http://purl.oclc.org/dsdl/schematron" xmlns:vuln="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf">
  <DocumentTitle xml:lang="en">CVE-2018-17205</DocumentTitle>
  <DocumentType>SUSE CVE</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE CVE-2018-17205</ID>
    </Identification>
    <Status>Interim</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>22</Number>
        <Date>2025-02-17T02:36:56Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2021-05-30T14:17:12Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-02-17T02:36:56Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf-cve.pl</Engine>
      <Date>2020-12-27T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="CVE" Type="Summary" Ordinal="1" xml:lang="en">CVE-2018-17205</Note>
    <Note Title="Mitre CVE Description" Type="Description" Ordinal="2" xml:lang="en">An issue was discovered in Open vSwitch (OvS) 2.7.x through 2.7.6, affecting ofproto_rule_insert__ in ofproto/ofproto.c. During bundle commit, flows that are added in a bundle are applied to ofproto in order. If a flow cannot be added (e.g., the flow action is a go-to for a group id that does not exist), OvS tries to revert back all previous flows that were successfully applied from the same bundle. This is possible since OvS maintains list of old flows that were replaced by flows from the bundle. While reinserting old flows, OvS has an assertion failure due to a check on rule state != RULE_INITIALIZED. This would work for new flows, but for an old flow the rule state is RULE_REMOVED. The assertion failure causes an OvS crash.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="4" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2018-December/004965.html</URL>
      <Description>E-Mail link for SUSE-SU-2018:4128-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RWWVMXVHK4TM7P3FSDLTKB3QSJBMQARY/#RWWVMXVHK4TM7P3FSDLTKB3QSJBMQARY</URL>
      <Description>E-Mail link for openSUSE-SU-2018:4148-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/prod">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise High Performance Computing 15">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Server Applications 15">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15" CPE="cpe:/o:suse:sle-module-server-applications:15">SUSE Linux Enterprise Module for Server Applications 15</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 12 SP3">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 12 SP3">
        <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP3" CPE="cpe:/o:suse:sles:12:sp3">SUSE Linux Enterprise Server 12 SP3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 12 SP3-TERADATA">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 12 SP3-TERADATA">
        <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP3-TERADATA" CPE="cpe:/o:suse:sles_teradata:12:sp3">SUSE Linux Enterprise Server 12 SP3-TERADATA</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 15">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Server Applications 15">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15" CPE="cpe:/o:suse:sle-module-server-applications:15">SUSE Linux Enterprise Module for Server Applications 15</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 12 SP3">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 12 SP3">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP3" CPE="cpe:/o:suse:sles_sap:12:sp3">SUSE Linux Enterprise Server for SAP Applications 12 SP3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 15">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Server Applications 15">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15" CPE="cpe:/o:suse:sle-module-server-applications:15">SUSE Linux Enterprise Module for Server Applications 15</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libopenvswitch-2_11-0">
      <FullProductName ProductID="libopenvswitch-2_11-0">libopenvswitch-2_11-0</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libopenvswitch-2_8-0">
      <FullProductName ProductID="libopenvswitch-2_8-0">libopenvswitch-2_8-0</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openvswitch">
      <FullProductName ProductID="openvswitch" CPE="cpe:2.3:a:openvswitch:openvswitch:*:*:*:*:*:*:*:*">openvswitch</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openvswitch-2.7.6-3.23.1">
      <FullProductName ProductID="openvswitch-2.7.6-3.23.1" CPE="cpe:2.3:a:openvswitch:openvswitch:2.7.6:*:*:*:*:*:*:*">openvswitch-2.7.6-3.23.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openvswitch-devel">
      <FullProductName ProductID="openvswitch-devel">openvswitch-devel</FullProductName>
    </Branch>
    <Relationship ProductReference="openvswitch-2.7.6-3.23.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP3:openvswitch-2.7.6-3.23.1">openvswitch-2.7.6-3.23.1 as a component of SUSE Linux Enterprise Server 12 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="openvswitch-2.7.6-3.23.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP3-TERADATA">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP3-TERADATA:openvswitch-2.7.6-3.23.1">openvswitch-2.7.6-3.23.1 as a component of SUSE Linux Enterprise Server 12 SP3-TERADATA</FullProductName>
    </Relationship>
    <Relationship ProductReference="openvswitch-2.7.6-3.23.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP3:openvswitch-2.7.6-3.23.1">openvswitch-2.7.6-3.23.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libopenvswitch-2_11-0" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Server Applications 15">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15:libopenvswitch-2_11-0">libopenvswitch-2_11-0 as a component of SUSE Linux Enterprise Module for Server Applications 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="libopenvswitch-2_8-0" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Server Applications 15">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15:libopenvswitch-2_8-0">libopenvswitch-2_8-0 as a component of SUSE Linux Enterprise Module for Server Applications 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="openvswitch" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Server Applications 15">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15:openvswitch">openvswitch as a component of SUSE Linux Enterprise Module for Server Applications 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="openvswitch-devel" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Server Applications 15">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Server Applications 15:openvswitch-devel">openvswitch-devel as a component of SUSE Linux Enterprise Module for Server Applications 15</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Open vSwitch (OvS) 2.7.x through 2.7.6, affecting ofproto_rule_insert__ in ofproto/ofproto.c. During bundle commit, flows that are added in a bundle are applied to ofproto in order. If a flow cannot be added (e.g., the flow action is a go-to for a group id that does not exist), OvS tries to revert back all previous flows that were successfully applied from the same bundle. This is possible since OvS maintains list of old flows that were replaced by flows from the bundle. While reinserting old flows, OvS has an assertion failure due to a check on rule state != RULE_INITIALIZED. This would work for new flows, but for an old flow the rule state is RULE_REMOVED. The assertion failure causes an OvS crash.</Note>
    </Notes>
    <CVE>CVE-2018-17205</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12 SP3:openvswitch-2.7.6-3.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP3-TERADATA:openvswitch-2.7.6-3.23.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP3:openvswitch-2.7.6-3.23.1</ProductID>
      </Status>
      <Status Type="Known Not Affected">
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15:libopenvswitch-2_11-0</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15:libopenvswitch-2_8-0</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15:openvswitch</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Server Applications 15:openvswitch-devel</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV2>
        <BaseScoreV2>5</BaseScoreV2>
        <VectorV2>AV:N/AC:L/Au:N/C:N/I:N/A:P</VectorV2>
      </ScoreSetV2>
      <ScoreSetV3>
        <BaseScoreV3>6.5</BaseScoreV3>
        <VectorV3>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
  </Vulnerability>
</cvrfdoc>
