Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-7543

Опубликовано: 08 авг. 2017
Источник: redhat
CVSS3: 5.3

Описание

A race-condition flaw was discovered in openstack-neutron before 7.2.0-12.1, 8.x before 8.3.0-11.1, 9.x before 9.3.1-2.1, and 10.x before 10.0.2-1.1, where, following a minor overcloud update, neutron security groups were disabled. Specifically, the following were reset to 0: net.bridge.bridge-nf-call-ip6tables and net.bridge.bridge-nf-call-iptables. The race was only triggered by an update, at which point an attacker could access exposed tenant VMs and network resources.

A race-condition flaw was discovered in openstack-neutron where, following a minor overcloud update, neutron security groups were disabled. Specifically, the following were reset to 0: net.bridge.bridge-nf-call-ip6tables and net.bridge.bridge-nf-call-iptables. The race was only triggered by an update, at which point an attacker could access exposed tenant VMs and network resources.

Меры по смягчению последствий

To determine whether your system is impacted, run: $ sudo sysctl net.bridge.bridge-nf-call-ip6tables $ sudo sysctl net.bridge.bridge-nf-call-iptables Both should be set to 1 To reset security groups to '1':

  1. Apply the following configuration modification: $ sudo sed -i.back -e 's/reapply_sysctl = 0/reapply_sysctl = 1/' /etc/tuned/tuned-main.conf
  2. Ensure the modification was successful: $ grep reapply_sysctl /etc/tuned/tuned-main.conf should be "reapply_sysctl = 1"
  3. Check whether tuned is running: $ sudo systemctl status tuned
  4. Restart tuned to apply the new configuration: $ sudo systemctl restart tuned
  5. Recheck your security groups and the status of 'reapply_sysctl'.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat OpenStack Platform 12 (Pike)openstack-neutronNot affected
Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7openstack-neutronFixedRHSA-2017:245208.08.2017
Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7openstack-neutronFixedRHSA-2017:245008.08.2017
Red Hat OpenStack Platform 10.0 (Newton)openstack-neutronFixedRHSA-2017:244808.08.2017
Red Hat OpenStack Platform 11.0 (Ocata)openstack-neutronFixedRHSA-2017:244908.08.2017
Red Hat OpenStack Platform 8.0 (Liberty)openstack-neutronFixedRHSA-2017:245108.08.2017
Red Hat OpenStack Platform 9.0 (Mitaka)openstack-neutronFixedRHSA-2017:244708.08.2017

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-362
https://bugzilla.redhat.com/show_bug.cgi?id=1473792openstack-neutron: iptables not active after update

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
ubuntu
больше 7 лет назад

A race-condition flaw was discovered in openstack-neutron before 7.2.0-12.1, 8.x before 8.3.0-11.1, 9.x before 9.3.1-2.1, and 10.x before 10.0.2-1.1, where, following a minor overcloud update, neutron security groups were disabled. Specifically, the following were reset to 0: net.bridge.bridge-nf-call-ip6tables and net.bridge.bridge-nf-call-iptables. The race was only triggered by an update, at which point an attacker could access exposed tenant VMs and network resources.

CVSS3: 5.3
nvd
больше 7 лет назад

A race-condition flaw was discovered in openstack-neutron before 7.2.0-12.1, 8.x before 8.3.0-11.1, 9.x before 9.3.1-2.1, and 10.x before 10.0.2-1.1, where, following a minor overcloud update, neutron security groups were disabled. Specifically, the following were reset to 0: net.bridge.bridge-nf-call-ip6tables and net.bridge.bridge-nf-call-iptables. The race was only triggered by an update, at which point an attacker could access exposed tenant VMs and network resources.

CVSS3: 5.3
debian
больше 7 лет назад

A race-condition flaw was discovered in openstack-neutron before 7.2.0 ...

CVSS3: 5.9
github
больше 3 лет назад

OpenStack Neutron Race Condition vulnerability

5.3 Medium

CVSS3