Man-in-the-Middle (MitM) Affecting openstack-neutron-ml2 package, versions *


Severity

Recommended
0.0
medium
0
10

Based on Red Hat Enterprise Linux security rating.

Threat Intelligence

EPSS
0.09% (40th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RHEL7-OPENSTACKNEUTRONML2-5245850
  • published27 Mar 2023
  • disclosed27 Apr 2018

Introduced: 27 Apr 2018

CVE-2018-14636  (opens in a new tab)
CWE-300  (opens in a new tab)

How to fix?

There is no fixed version for RHEL:7 openstack-neutron-ml2.

NVD Description

Note: Versions mentioned in the description apply only to the upstream openstack-neutron-ml2 package and not the openstack-neutron-ml2 package as distributed by RHEL. See How to fix? for RHEL:7 relevant fixed versions and status.

Live-migrated instances are briefly able to inspect traffic for other instances on the same hypervisor. This brief window could be extended indefinitely if the instance's port is set administratively down prior to live-migration and kept down after the migration is complete. This is possible due to the Open vSwitch integration bridge being connected to the instance during migration. When connected to the integration bridge, all traffic for instances using the same Open vSwitch instance would potentially be visible to the migrated guest, as the required Open vSwitch VLAN filters are only applied post-migration. Versions of openstack-neutron before 13.0.0.0b2, 12.0.3, 11.0.5 are vulnerable.