CVE-2017-7543

Related Vulnerabilities: CVE-2017-7543  

A race-condition flaw was discovered in openstack-neutron where, following a minor overcloud update, neutron security groups were disabled. Specifically, the following were reset to 0: net.bridge.bridge-nf-call-ip6tables and net.bridge.bridge-nf-call-iptables. The race was only triggered by an update, at which point an attacker could access exposed tenant VMs and network resources.

A race-condition flaw was discovered in openstack-neutron where, following a minor overcloud update, neutron security groups were disabled. Specifically, the following were reset to 0: net.bridge.bridge-nf-call-ip6tables and net.bridge.bridge-nf-call-iptables. The race was only triggered by an update, at which point an attacker could access exposed tenant VMs and network resources.

Find out more about CVE-2017-7543 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v3 metrics

CVSS3 Base Score 5.3
CVSS3 Base Metrics CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
Attack Vector Network
Attack Complexity High
Privileges Required None
User Interaction Required
Scope Unchanged
Confidentiality High
Integrity Impact None
Availability Impact None

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7 (openstack-neutron) RHSA-2017:2450 2017-08-08
Red Hat OpenStack Platform 11.0 (Ocata) (openstack-neutron) RHSA-2017:2449 2017-08-08
Red Hat OpenStack Platform 8.0 (Liberty) (openstack-neutron) RHSA-2017:2451 2017-08-08
Red Hat OpenStack Platform 9.0 (openstack-neutron) RHSA-2017:2447 2017-08-08
Red Hat OpenStack Platform 10 (openstack-neutron) RHSA-2017:2448 2017-08-08
Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7 (openstack-neutron) RHSA-2017:2452 2017-08-08

Affected Packages State

Platform Package State
Red Hat OpenStack Platform 12.0 openstack-neutron Not affected

Acknowledgements

This issue was discovered by Paul Needle (Red Hat).