CVE-2018-14636

Impact:
Moderate
Public Date:
2018-04-27
CWE:
CWE-300
Bugzilla:
1594977: CVE-2018-14636 openstack-neutron: eavesdropping private traffic due to trunk ports after live migration
Live-migrated instances are briefly able to inspect traffic for other instances on the same hypervisor. This brief window could be extended indefinitely if the instance's port is set administratively down prior to live-migration and kept down after the migration is complete. This is possible due to the Open vSwitch integration bridge being connected to the instance during migration. When connected to the integration bridge, all traffic for instances using the same Open vSwitch instance would potentially be visible to the migrated guest, as the required Open vSwitch VLAN filters are only applied post-migration.

Find out more about CVE-2018-14636 from the MITRE CVE dictionary dictionary and NIST NVD.

Statement

Red Hat OpenStack Platform 10:
This vulnerability has been rated as having a security impact of Moderate. After evaluation and in accordance with the criteria noted in the product support life cycle, there are no plans to address this issue in an upcoming release. Please contact Red Hat Support for further information.

Red Hat OpenStack Platform 12.0:
This vulnerability has been rated as having a security impact of Moderate. After evaluation and in accordance with the criteria noted in the product support life cycle, there are no plans to address this issue in an upcoming release. Please contact Red Hat Support for further information.

Red Hat OpenStack Platform 13.0 (Queens):
This vulnerability has been rated as having a security impact of Moderate. After evaluation and in accordance with the criteria noted in the product support life cycle, there are no plans to address this issue in an upcoming release. Please contact Red Hat Support for further information.

Red Hat OpenStack Platform 14.0 (Rocky):
This vulnerability has been rated as having a security impact of Moderate. After evaluation and in accordance with the criteria noted in the product support life cycle, there are no plans to address this issue in an upcoming release. Please contact Red Hat Support for further information.

Red Hat OpenStack Platform 8.0 (Liberty):
This vulnerability has been rated as having a security impact of Moderate. After evaluation and in accordance with the criteria noted in the product support life cycle, there are no plans to address this issue in an upcoming release. Please contact Red Hat Support for further information.

Red Hat OpenStack Platform 9.0:
This vulnerability has been rated as having a security impact of Moderate. After evaluation and in accordance with the criteria noted in the product support life cycle, there are no plans to address this issue in an upcoming release. Please contact Red Hat Support for further information.

CVSS v3 metrics

NOTE: The following CVSS v3 metrics and score provided are preliminary and subject to review.

CVSS3 Base Score 5.3
CVSS3 Base Metrics CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
Attack Vector Network
Attack Complexity High
Privileges Required Low
User Interaction None
Scope Unchanged
Confidentiality High
Integrity Impact None
Availability Impact None

Affected Packages State

Platform Package State
Red Hat OpenStack Platform 9.0 openstack-neutron Will not fix
Red Hat OpenStack Platform 8.0 (Liberty) openstack-neutron Will not fix
Red Hat OpenStack Platform 14.0 (Rocky) openstack-neutron Will not fix
Red Hat OpenStack Platform 13.0 (Queens) openstack-neutron Will not fix
Red Hat OpenStack Platform 12.0 openstack-neutron Will not fix
Red Hat OpenStack Platform 10 openstack-neutron Will not fix
Red Hat JBoss Fuse 7 openstack-neutron Not affected
Unless explicitly stated as not affected, all previous versions of packages in any minor update stream of a product listed here should be assumed vulnerable, although may not have been subject to full analysis.
Last Modified