First published: Tue Jul 24 2018(Updated: )
When using the Linux bridge ml2 driver, non-privileged tenants are able to create and attach ports without specifying an IP address, bypassing IP address validation. A potential denial of service could occur if an IP address, conflicting with existing guests or routers, is then assigned from outside of the allowed allocation pool. Versions of openstack-neutron before 13.0.0.0b2, 12.0.3 and 11.0.5 are vulnerable.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Openstack | =10 | |
Redhat Openstack | =12 | |
Redhat Openstack | =13 | |
OpenStack Neutron | >=11.0.0<=11.0.5 | |
OpenStack Neutron | >=12.0.0<=12.0.3 | |
OpenStack Neutron | =13.0.0.0-b1 | |
redhat/openstack-neutron | <13.0.0.0 | 13.0.0.0 |
redhat/openstack-neutron | <12.0.3 | 12.0.3 |
redhat/openstack-neutron | <11.0.5 | 11.0.5 |
pip/neutron | >=12.0.0<12.0.4 | 12.0.4 |
pip/neutron | <11.0.6 | 11.0.6 |
pip/neutron | =13.0.0.0b1 | 13.0.0.0b2 |
https://git.openstack.org/cgit/openstack/neutron/commit/?id=54aa6e81cb17b33ce4d5d469cc11dec2869c762d
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-14635 is a vulnerability that allows non-privileged tenants to create and attach ports without specifying an IP address, bypassing IP address validation.
RedHat OpenStack versions 10, 12, and 13, as well as OpenStack Neutron versions 11.0.0 to 11.0.5, 12.0.0 to 12.0.3, and 13.0.0.0-b1 are affected.
The severity of CVE-2018-14635 is medium with a CVSS score of 6.5.
To fix CVE-2018-14635, update to RedHat OpenStack version 10.7 (or later) for version 10, version 12.0.7 (or later) for version 12, and version 13.0.1 (or later) for version 13.
You can find more information about CVE-2018-14635 on the RedHat security advisory page: [https://access.redhat.com/errata/RHSA-2018:2710](https://access.redhat.com/errata/RHSA-2018:2710)