Search for packages
| purl | pkg:deb/debian/neutron@2:21.0.0-7?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-26nq-rncj-qbbv | openstack-neutron: regression of fix for CVE-2013-6433 |
CVE-2014-3632
|
| VCID-4fyj-d9qy-fffp | An issue was discovered in OpenStack Neutron 11.x before 11.0.7, 12.x before 12.0.6, and 13.x before 13.0.3. By creating two security groups with separate/overlapping port ranges, an authenticated user may prevent Neutron from being able to configure networks on any compute nodes where those security groups are present, because of an Open vSwitch (OVS) firewall KeyError. All Neutron deployments utilizing neutron-openvswitch-agent are affected. |
CVE-2019-10876
GHSA-jr9m-v5qh-mh2j PYSEC-2019-189 |
| VCID-57rk-q94h-3kgz | When using the Linux bridge ml2 driver, non-privileged tenants are able to create and attach ports without specifying an IP address, bypassing IP address validation. A potential denial of service could occur if an IP address, conflicting with existing guests or routers, is then assigned from outside of the allowed allocation pool. Versions of openstack-neutron before 13.0.0.0b2, 12.0.3 and 11.0.5 are vulnerable. |
CVE-2018-14635
GHSA-x634-34m9-96mp PYSEC-2018-93 |
| VCID-5j9j-5nv7-wyem | openstack-neutron: security groups bypass through invalid CIDR |
CVE-2014-0187
|
| VCID-6j79-2nz1-53cs | OpenStack Neutron allows remote attackers to bypass an intended DHCP-spoofing protection mechanism The IPTables firewall in OpenStack Neutron before 7.0.4 and 8.0.0 through 8.1.0 allows remote attackers to bypass an intended DHCP-spoofing protection mechanism and consequently cause a denial of service or intercept network traffic via a crafted DHCP discovery message. |
CVE-2016-5362
GHSA-qpwc-p365-pqrr |
| VCID-7sem-1dhy-vbdw | OpenStack Neutron Intended MAC-spoofing protection mechanism bypass The IPTables firewall in OpenStack Neutron up to 7.0.4 and 8.x before 8.1.0 allows remote attackers to bypass an intended MAC-spoofing protection mechanism and consequently cause a denial of service or intercept network traffic via (1) a crafted DHCP discovery message or (2) crafted non-IP traffic. |
CVE-2016-5363
GHSA-9pp3-cvmq-9p22 |
| VCID-9urm-66y7-s3hs | OpenStack Neutron allows remote authenticated users to cause a denial of service OpenStack Neutron before 2013.2.4, 2014.x before 2014.1.2, and Juno before Juno-2 allows remote authenticated users to cause a denial of service (crash or long firewall rule updates) by creating a large number of allowed address pairs. |
CVE-2014-3555
GHSA-4pmp-38hf-rmwj |
| VCID-b3pu-ncrc-wbhn | An issue was discovered in the iptables firewall module in OpenStack Neutron before 10.0.8, 11.x before 11.0.7, 12.x before 12.0.6, and 13.x before 13.0.3. By setting a destination port in a security group rule along with a protocol that doesn't support that option (for example, VRRP), an authenticated user may block further application of security group rules for instances from any project/tenant on the compute hosts to which it's applied. (Only deployments using the iptables security group driver are affected.) |
CVE-2019-9735
GHSA-9773-3fqg-8w25 PYSEC-2019-190 |
| VCID-ba8p-f96g-aqc3 | Live-migrated instances are briefly able to inspect traffic for other instances on the same hypervisor. This brief window could be extended indefinitely if the instance's port is set administratively down prior to live-migration and kept down after the migration is complete. This is possible due to the Open vSwitch integration bridge being connected to the instance during migration. When connected to the integration bridge, all traffic for instances using the same Open vSwitch instance would potentially be visible to the migrated guest, as the required Open vSwitch VLAN filters are only applied post-migration. Versions of openstack-neutron before 13.0.0.0b2, 12.0.3, 11.0.5 are vulnerable. |
CVE-2018-14636
GHSA-8q95-jj7p-x93x PYSEC-2018-94 |
| VCID-cy6c-1e49-27cz | pycadf: token leak to message queue |
CVE-2014-4615
|
| VCID-d7zk-1d89-dbbw | OpenStack Neutron can use an incorrect ID during policy enforcement In OpenStack Neutron before 25.0.1, neutron/extensions/tagging.py can use an incorrect ID during policy enforcement. It does not apply the proper policy check for changing network tags. An unprivileged tenant is able to change (add and clear) tags on network objects that do not belong to the tenant, and this action is not subjected to the proper policy authorization check. This affects 23 before 23.2.1, 24 before 24.0.2, and 25 before 25.0.1. |
CVE-2024-53916
GHSA-f27h-g923-68hw |
| VCID-ejd8-7jqx-zbfy | PackStack: Neutron Security Groups fail to block network traffic |
CVE-2014-0071
|
| VCID-f9bx-xknx-6qbv | OpenStack Neutron before 16.4.1, 17.x before 17.1.3, and 18.0.0 allows hardware address impersonation when the linuxbridge driver with ebtables-nft is used on a Netfilter-based platform. By sending carefully crafted packets, anyone in control of a server instance connected to the virtual switch can impersonate the hardware addresses of other systems on the network, resulting in denial of service or in some cases possibly interception of traffic intended for other destinations. |
CVE-2021-38598
GHSA-hvm4-mc7m-22w4 PYSEC-2021-360 |
| VCID-fqwt-ecwa-1kex | OpenStack Neutron Improper Authentication vulnerability The l3-agent in OpenStack Neutron 2012.2 before 2013.2.3 does not check the tenant id when creating ports, which allows remote authenticated users to plug ports into the routers of arbitrary tenants via the device id in a port-create command. |
CVE-2014-0056
GHSA-72p9-6gc7-q93r |
| VCID-hcsa-vfvp-buax | OpenStack Nova Router metadata queries are not restricted by tenant Interaction error in OpenStack Nova and Neutron before Havana 2013.2.1 and icehouse-1 does not validate the instance ID of the tenant making a request, which allows remote tenants to obtain sensitive metadata by spoofing the device ID that is bound to a port, which is not properly handled by (1) api/metadata/handler.py in Nova and (2) the neutron-metadata-agent (`agent/metadata/agent.py`) in Neutron. |
CVE-2013-6419
GHSA-22w9-j288-8p9w |
| VCID-kk9h-cvg8-23he | openstack-neutron: DoS via maliciously crafted dns_nameservers |
CVE-2014-7821
|
| VCID-kv7h-v2g8-6fdj | OpenStack Neutron allows remote attackers to bypass an intended ICMPv6-spoofing protection mechanism The IPTables firewall in OpenStack Neutron before 7.0.4 and 8.0.0 through 8.1.0 allows remote attackers to bypass an intended ICMPv6-spoofing protection mechanism and consequently cause a denial of service or intercept network traffic via a link-local source address. |
CVE-2015-8914
GHSA-3vj4-cvjp-482h |
| VCID-m3za-mbev-uuc1 | openstack-neutron: Admin-only network attributes may be reset to defaults by non-privileged users |
CVE-2014-6414
|
| VCID-mgz8-9mkb-m3gv | openstack-neutron: L3-agent denial of service through IPv6 subnet |
CVE-2014-4167
|
| VCID-qua4-h1r7-a7b7 | openstack-neutron uncontrolled resource consumption flaw An uncontrolled resource consumption flaw was found in openstack-neutron. This flaw allows a remote authenticated user to query a list of security groups for an invalid project. This issue creates resources that are unconstrained by the user's quota. If a malicious user were to submit a significant number of requests, this could lead to a denial of service. |
CVE-2022-3277
GHSA-w446-h7vg-wv3p |
| VCID-s58r-txyg-g3aw | Concurrent Execution using Shared Resource with Improper Synchronization (Race Condition) A race-condition flaw was discovered in openstack-neutron: following a minor overcloud update, neutron security groups were disabled. |
CVE-2017-7543
GHSA-hvxr-2fvv-c3wq |
| VCID-sh88-99pv-aqac | A flaw was found in openstack-neutron's default Open vSwitch firewall rules. By sending carefully crafted packets, anyone in control of a server instance connected to the virtual switch can impersonate the IPv6 addresses of other systems on the network, resulting in denial of service or in some cases possibly interception of traffic intended for other destinations. Only deployments using the Open vSwitch driver are affected. Source: OpenStack project. Versions before openstack-neutron 15.3.3, openstack-neutron 16.3.1 and openstack-neutron 17.1.1 are affected. |
CVE-2021-20267
GHSA-w8hx-f868-pvch PYSEC-2021-136 |
| VCID-tmfc-jgc1-ykat | openstack-neutron: L3 agent denial of service with radvd 2.0+ (OSSA 2015-001) |
CVE-2014-8153
|
| VCID-u9wn-d3kr-7ubj | openstack-quantum/openstack-neutron: rootwrap sudo config allows potential privilege escalation |
CVE-2013-6433
|
| VCID-uf52-su2e-y3ck | Improper Input Validation A Denial-of-Service flaw was found in the OpenStack Networking (neutron) L2 agent when using the iptables firewall driver. By submitting an address pair that is rejected as invalid by the ipset tool (with zero prefix size), an authenticated attacker can cause the L2 agent to crash. |
CVE-2015-3221
GHSA-wf44-4mgj-rwvx |
| VCID-w7qg-pen7-tfbr | An issue was discovered in OpenStack Neutron before 16.4.1, 17.x before 17.2.1, and 18.x before 18.1.1. Authenticated attackers can reconfigure dnsmasq via a crafted extra_dhcp_opts value. |
CVE-2021-40085
GHSA-fh73-gjvg-349c PYSEC-2021-361 |
| VCID-wv6g-4622-tqdw | An issue was discovered in the routes middleware in OpenStack Neutron before 16.4.1, 17.x before 17.2.1, and 18.x before 18.1.1. By making API requests involving nonexistent controllers, an authenticated user may cause the API worker to consume increasing amounts of memory, resulting in API performance degradation or denial of service. |
CVE-2021-40797
GHSA-cpx3-696p-3cw9 PYSEC-2021-329 |
| VCID-ydug-1dq5-aya1 | Uncontrolled Resource Consumption An uncontrolled resource consumption flaw was found in openstack-neutron. This flaw allows a remote authenticated user to query a list of security groups for an invalid project. This issue creates resources that are unconstrained by the user's quota. If a malicious user were to submit a significant number of requests, this could lead to a denial of service. |
CVE-2023-3637
GHSA-r3jh-qhgj-gvr8 |
| VCID-yrqg-evxw-a7cb | OpenStack Neutron Race condition vulnerability Race condition in OpenStack Neutron before 2014.2.4 and 2015.1 before 2015.1.2, when using the ML2 plugin or the security groups AMQP API, allows remote authenticated users to bypass IP anti-spoofing controls by changing the device owner of a port to start with network: before the security group rules are applied. |
CVE-2015-5240
GHSA-hhpj-6pj7-wpx5 |