First published: Wed Aug 03 2022(Updated: )
An issue was discovered in OpenStack Nova before 23.2.2, 24.x before 24.1.2, and 25.x before 25.0.2. By creating a neutron port with the direct vnic_type, creating an instance bound to that port, and then changing the vnic_type of the bound port to macvtap, an authenticated user may cause the compute service to fail to restart, resulting in a possible denial of service. Only Nova deployments configured with SR-IOV are affected.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenStack Nova | <23.2.2 | |
OpenStack Nova | >=24.0.0<24.1.2 | |
OpenStack Nova | >=25.0.0<25.0.2 | |
pip/nova | >=25.0.0<25.0.2 | 25.0.2 |
pip/nova | >=24.0.0<24.1.2 | 24.1.2 |
pip/nova | <23.2.2 | 23.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2022-37394.
CVE-2022-37394 has a severity level of low.
CVE-2022-37394 affects OpenStack Nova versions before 23.2.2, 24.x before 24.1.2, and 25.x before 25.0.2.
An authenticated user can exploit CVE-2022-37394 by creating a neutron port with the direct vnic_type, creating an instance bound to that port, and then changing the vnic_type of the bound port to macvtap.
Yes, you can find references for CVE-2022-37394 at the following links: [Link 1](https://bugs.launchpad.net/ossa/+bug/1981813), [Link 2](https://review.opendev.org/c/openstack/nova/+/849985), [Link 3](https://review.opendev.org/c/openstack/nova/+/850003).