A race-condition flaw was discovered in openstack-neutron before 7.2.0-12.1, 8.x before 8.3.0-11.1, 9.x before 9.3.1-2.1, and 10.x before 10.0.2-1.1, where, following a minor overcloud update, neutron security groups were disabled. Specifically, the following were reset to 0: net.bridge.bridge-nf-call-ip6tables and net.bridge.bridge-nf-call-iptables. The race was only triggered by an update, at which point an attacker could access exposed tenant VMs and network resources.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-4222 A race-condition flaw was discovered in openstack-neutron before 7.2.0-12.1, 8.x before 8.3.0-11.1, 9.x before 9.3.1-2.1, and 10.x before 10.0.2-1.1, where, following a minor overcloud update, neutron security groups were disabled. Specifically, the following were reset to 0: net.bridge.bridge-nf-call-ip6tables and net.bridge.bridge-nf-call-iptables. The race was only triggered by an update, at which point an attacker could access exposed tenant VMs and network resources.
Github GHSA Github GHSA GHSA-hvxr-2fvv-c3wq OpenStack Neutron Race Condition vulnerability
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-05T16:04:11.998Z

Reserved: 2017-04-05T00:00:00

Link: CVE-2017-7543

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-07-26T14:29:00.483

Modified: 2024-11-21T03:32:07.890

Link: CVE-2017-7543

cve-icon Redhat

Severity : Important

Publid Date: 2017-08-08T00:00:00Z

Links: CVE-2017-7543 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses