Red Hat OpenStack Platform update for openstack-nova



Published: 2023-04-26
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2022-37394
CWE-ID CWE-371
Exploitation vector Local
Public exploit N/A
Vulnerable software
Subscribe
Red Hat OpenStack
Server applications / Other server solutions

openstack-nova (Red Hat package)
Operating systems & Components / Operating system package or component

Vendor Red Hat Inc.

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) State Issues

EUVDB-ID: #VU75530

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-37394

CWE-ID: CWE-371 - State Issues

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an error, related to port binding. By creating a neutron port with the direct vnic_type, creating an instance bound to that port, and then changing the vnic_type of the bound port to macvtap, an authenticated user may cause the compute service to fail to restart, resulting in a possible denial of service.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat OpenStack: 16.2

openstack-nova (Red Hat package): before 20.6.2-2.20230308185148.fc01371.el8ost

External links

http://access.redhat.com/errata/RHSA-2023:1948


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###