Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/neutron@0?distro=trixie
purl pkg:deb/debian/neutron@0?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (5)
Vulnerability Summary Aliases
VCID-26nq-rncj-qbbv openstack-neutron: regression of fix for CVE-2013-6433 CVE-2014-3632
VCID-d7zk-1d89-dbbw OpenStack Neutron can use an incorrect ID during policy enforcement In OpenStack Neutron before 25.0.1, neutron/extensions/tagging.py can use an incorrect ID during policy enforcement. It does not apply the proper policy check for changing network tags. An unprivileged tenant is able to change (add and clear) tags on network objects that do not belong to the tenant, and this action is not subjected to the proper policy authorization check. This affects 23 before 23.2.1, 24 before 24.0.2, and 25 before 25.0.1. CVE-2024-53916
GHSA-f27h-g923-68hw
VCID-s58r-txyg-g3aw Concurrent Execution using Shared Resource with Improper Synchronization (Race Condition) A race-condition flaw was discovered in openstack-neutron: following a minor overcloud update, neutron security groups were disabled. CVE-2017-7543
GHSA-hvxr-2fvv-c3wq
VCID-tmfc-jgc1-ykat openstack-neutron: L3 agent denial of service with radvd 2.0+ (OSSA 2015-001) CVE-2014-8153
VCID-ydug-1dq5-aya1 Uncontrolled Resource Consumption An uncontrolled resource consumption flaw was found in openstack-neutron. This flaw allows a remote authenticated user to query a list of security groups for an invalid project. This issue creates resources that are unconstrained by the user's quota. If a malicious user were to submit a significant number of requests, this could lead to a denial of service. CVE-2023-3637
GHSA-r3jh-qhgj-gvr8

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T12:43:50.384744+00:00 Debian Importer Fixing VCID-26nq-rncj-qbbv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:17:45.674254+00:00 Debian Importer Fixing VCID-tmfc-jgc1-ykat https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:32:16.890348+00:00 Debian Importer Fixing VCID-ydug-1dq5-aya1 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:36:02.029921+00:00 Debian Importer Fixing VCID-d7zk-1d89-dbbw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:33:25.302080+00:00 Debian Importer Fixing VCID-s58r-txyg-g3aw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T08:43:45.433996+00:00 Debian Importer Fixing VCID-26nq-rncj-qbbv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:24:32.707700+00:00 Debian Importer Fixing VCID-tmfc-jgc1-ykat https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:06:51.327572+00:00 Debian Importer Fixing VCID-ydug-1dq5-aya1 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:23:34.882428+00:00 Debian Importer Fixing VCID-d7zk-1d89-dbbw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:22:12.016723+00:00 Debian Importer Fixing VCID-s58r-txyg-g3aw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:46:57.288709+00:00 Debian Importer Fixing VCID-d7zk-1d89-dbbw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:46:57.236778+00:00 Debian Importer Fixing VCID-ydug-1dq5-aya1 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:46:56.682034+00:00 Debian Importer Fixing VCID-s58r-txyg-g3aw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:46:56.380671+00:00 Debian Importer Fixing VCID-tmfc-jgc1-ykat https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:46:56.121286+00:00 Debian Importer Fixing VCID-26nq-rncj-qbbv https://security-tracker.debian.org/tracker/data/json 38.1.0