A race-condition flaw was discovered in openstack-neutron where, following a minor overcloud update, neutron security groups were disabled. Specifically, the following were reset to 0: net.bridge.bridge-nf-call-ip6tables and net.bridge.bridge-nf-call-iptables. The race was only triggered by an update, at which point an attacker could access exposed tenant VMs and network resources.
Find out more about CVE-2017-7543 from the MITRE CVE dictionary dictionary and NIST NVD.
CVSS3 Base Score | 5.3 |
---|---|
CVSS3 Base Metrics | CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N |
Attack Vector | Network |
Attack Complexity | High |
Privileges Required | None |
User Interaction | Required |
Scope | Unchanged |
Confidentiality | High |
Integrity Impact | None |
Availability Impact | None |
Platform | Errata | Release Date |
---|---|---|
Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7 (openstack-neutron) | RHSA-2017:2450 | 2017-08-08 |
Red Hat OpenStack Platform 11.0 (Ocata) (openstack-neutron) | RHSA-2017:2449 | 2017-08-08 |
Red Hat OpenStack Platform 8.0 (Liberty) (openstack-neutron) | RHSA-2017:2451 | 2017-08-08 |
Red Hat OpenStack Platform 9.0 (openstack-neutron) | RHSA-2017:2447 | 2017-08-08 |
Red Hat OpenStack Platform 10 (openstack-neutron) | RHSA-2017:2448 | 2017-08-08 |
Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7 (openstack-neutron) | RHSA-2017:2452 | 2017-08-08 |
Platform | Package | State |
---|---|---|
Red Hat OpenStack Platform 12.0 | openstack-neutron | Not affected |