CVE-2018-14635
When using the Linux bridge ml2 driver, non-privileged tenants are able to create and attach ports without specifying an IP address, bypassing IP address validation. A potential denial of service could occur if an IP address, conflicting with existing guests or routers, is then assigned from outside of the allowed allocation pool.
Find out more about CVE-2018-14635 from the MITRE CVE dictionary dictionary and NIST NVD.
CVSS v3 metrics
| CVSS3 Base Score | 6.5 |
|---|---|
| CVSS3 Base Metrics | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
| Attack Vector | Network |
| Attack Complexity | Low |
| Privileges Required | Low |
| User Interaction | None |
| Scope | Unchanged |
| Confidentiality | None |
| Integrity Impact | None |
| Availability Impact | High |
Red Hat Security Errata
| Platform | Errata | Release Date |
|---|---|---|
| Red Hat OpenStack Platform 10 (openstack-neutron) | RHSA-2018:2715 | 2018-09-17 |
| Red Hat OpenStack Platform 13.0 (Queens) (openstack-neutron) | RHSA-2018:2710 | 2018-09-17 |
Affected Packages State
| Platform | Package | State |
|---|---|---|
| Red Hat OpenStack Platform 9.0 | openstack-neutron | Will not fix |
| Red Hat OpenStack Platform 8.0 (Liberty) | openstack-neutron | Will not fix |
| Red Hat OpenStack Platform 12.0 | openstack-neutron | Affected |
| Red Hat JBoss Fuse 7 | openstack-neutron | Under investigation |
| Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7 | openstack-neutron | Will not fix |
