Search for packages
| purl | pkg:deb/debian/neutron@2014.1.3-12 |
| Next non-vulnerable version | 2:21.0.0-7 |
| Latest non-vulnerable version | 2:21.0.0-7 |
| Risk | 10.0 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-4fyj-d9qy-fffp
Aliases: CVE-2019-10876 GHSA-jr9m-v5qh-mh2j PYSEC-2019-189 |
An issue was discovered in OpenStack Neutron 11.x before 11.0.7, 12.x before 12.0.6, and 13.x before 13.0.3. By creating two security groups with separate/overlapping port ranges, an authenticated user may prevent Neutron from being able to configure networks on any compute nodes where those security groups are present, because of an Open vSwitch (OVS) firewall KeyError. All Neutron deployments utilizing neutron-openvswitch-agent are affected. |
Affected by 4 other vulnerabilities. |
|
VCID-57rk-q94h-3kgz
Aliases: CVE-2018-14635 GHSA-x634-34m9-96mp PYSEC-2018-93 |
When using the Linux bridge ml2 driver, non-privileged tenants are able to create and attach ports without specifying an IP address, bypassing IP address validation. A potential denial of service could occur if an IP address, conflicting with existing guests or routers, is then assigned from outside of the allowed allocation pool. Versions of openstack-neutron before 13.0.0.0b2, 12.0.3 and 11.0.5 are vulnerable. |
Affected by 4 other vulnerabilities. |
|
VCID-6j79-2nz1-53cs
Aliases: CVE-2016-5362 GHSA-qpwc-p365-pqrr |
OpenStack Neutron allows remote attackers to bypass an intended DHCP-spoofing protection mechanism The IPTables firewall in OpenStack Neutron before 7.0.4 and 8.0.0 through 8.1.0 allows remote attackers to bypass an intended DHCP-spoofing protection mechanism and consequently cause a denial of service or intercept network traffic via a crafted DHCP discovery message. |
Affected by 8 other vulnerabilities. |
|
VCID-7sem-1dhy-vbdw
Aliases: CVE-2016-5363 GHSA-9pp3-cvmq-9p22 |
OpenStack Neutron Intended MAC-spoofing protection mechanism bypass The IPTables firewall in OpenStack Neutron up to 7.0.4 and 8.x before 8.1.0 allows remote attackers to bypass an intended MAC-spoofing protection mechanism and consequently cause a denial of service or intercept network traffic via (1) a crafted DHCP discovery message or (2) crafted non-IP traffic. |
Affected by 8 other vulnerabilities. |
|
VCID-b3pu-ncrc-wbhn
Aliases: CVE-2019-9735 GHSA-9773-3fqg-8w25 PYSEC-2019-190 |
An issue was discovered in the iptables firewall module in OpenStack Neutron before 10.0.8, 11.x before 11.0.7, 12.x before 12.0.6, and 13.x before 13.0.3. By setting a destination port in a security group rule along with a protocol that doesn't support that option (for example, VRRP), an authenticated user may block further application of security group rules for instances from any project/tenant on the compute hosts to which it's applied. (Only deployments using the iptables security group driver are affected.) |
Affected by 8 other vulnerabilities. Affected by 4 other vulnerabilities. |
|
VCID-ba8p-f96g-aqc3
Aliases: CVE-2018-14636 GHSA-8q95-jj7p-x93x PYSEC-2018-94 |
Live-migrated instances are briefly able to inspect traffic for other instances on the same hypervisor. This brief window could be extended indefinitely if the instance's port is set administratively down prior to live-migration and kept down after the migration is complete. This is possible due to the Open vSwitch integration bridge being connected to the instance during migration. When connected to the integration bridge, all traffic for instances using the same Open vSwitch instance would potentially be visible to the migrated guest, as the required Open vSwitch VLAN filters are only applied post-migration. Versions of openstack-neutron before 13.0.0.0b2, 12.0.3, 11.0.5 are vulnerable. |
Affected by 4 other vulnerabilities. |
|
VCID-f9bx-xknx-6qbv
Aliases: CVE-2021-38598 GHSA-hvm4-mc7m-22w4 PYSEC-2021-360 |
OpenStack Neutron before 16.4.1, 17.x before 17.1.3, and 18.0.0 allows hardware address impersonation when the linuxbridge driver with ebtables-nft is used on a Netfilter-based platform. By sending carefully crafted packets, anyone in control of a server instance connected to the virtual switch can impersonate the hardware addresses of other systems on the network, resulting in denial of service or in some cases possibly interception of traffic intended for other destinations. |
Affected by 1 other vulnerability. |
|
VCID-kv7h-v2g8-6fdj
Aliases: CVE-2015-8914 GHSA-3vj4-cvjp-482h |
OpenStack Neutron allows remote attackers to bypass an intended ICMPv6-spoofing protection mechanism The IPTables firewall in OpenStack Neutron before 7.0.4 and 8.0.0 through 8.1.0 allows remote attackers to bypass an intended ICMPv6-spoofing protection mechanism and consequently cause a denial of service or intercept network traffic via a link-local source address. |
Affected by 8 other vulnerabilities. |
|
VCID-sh88-99pv-aqac
Aliases: CVE-2021-20267 GHSA-w8hx-f868-pvch PYSEC-2021-136 |
A flaw was found in openstack-neutron's default Open vSwitch firewall rules. By sending carefully crafted packets, anyone in control of a server instance connected to the virtual switch can impersonate the IPv6 addresses of other systems on the network, resulting in denial of service or in some cases possibly interception of traffic intended for other destinations. Only deployments using the Open vSwitch driver are affected. Source: OpenStack project. Versions before openstack-neutron 15.3.3, openstack-neutron 16.3.1 and openstack-neutron 17.1.1 are affected. |
Affected by 1 other vulnerability. |
|
VCID-uf52-su2e-y3ck
Aliases: CVE-2015-3221 GHSA-wf44-4mgj-rwvx |
Improper Input Validation A Denial-of-Service flaw was found in the OpenStack Networking (neutron) L2 agent when using the iptables firewall driver. By submitting an address pair that is rejected as invalid by the ipset tool (with zero prefix size), an authenticated attacker can cause the L2 agent to crash. |
Affected by 11 other vulnerabilities. |
|
VCID-w7qg-pen7-tfbr
Aliases: CVE-2021-40085 GHSA-fh73-gjvg-349c PYSEC-2021-361 |
An issue was discovered in OpenStack Neutron before 16.4.1, 17.x before 17.2.1, and 18.x before 18.1.1. Authenticated attackers can reconfigure dnsmasq via a crafted extra_dhcp_opts value. |
Affected by 4 other vulnerabilities. Affected by 1 other vulnerability. |
|
VCID-wv6g-4622-tqdw
Aliases: CVE-2021-40797 GHSA-cpx3-696p-3cw9 PYSEC-2021-329 |
An issue was discovered in the routes middleware in OpenStack Neutron before 16.4.1, 17.x before 17.2.1, and 18.x before 18.1.1. By making API requests involving nonexistent controllers, an authenticated user may cause the API worker to consume increasing amounts of memory, resulting in API performance degradation or denial of service. |
Affected by 1 other vulnerability. |
|
VCID-yrqg-evxw-a7cb
Aliases: CVE-2015-5240 GHSA-hhpj-6pj7-wpx5 |
OpenStack Neutron Race condition vulnerability Race condition in OpenStack Neutron before 2014.2.4 and 2015.1 before 2015.1.2, when using the ML2 plugin or the security groups AMQP API, allows remote authenticated users to bypass IP anti-spoofing controls by changing the device owner of a port to start with network: before the security group rules are applied. |
Affected by 11 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||