Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/neutron@2:9.1.1-3%2Bdeb9u1
purl pkg:deb/debian/neutron@2:9.1.1-3%2Bdeb9u1
Next non-vulnerable version 2:21.0.0-7
Latest non-vulnerable version 2:21.0.0-7
Risk 4.1
Vulnerabilities affecting this package (8)
Vulnerability Summary Fixed by
VCID-4fyj-d9qy-fffp
Aliases:
CVE-2019-10876
GHSA-jr9m-v5qh-mh2j
PYSEC-2019-189
An issue was discovered in OpenStack Neutron 11.x before 11.0.7, 12.x before 12.0.6, and 13.x before 13.0.3. By creating two security groups with separate/overlapping port ranges, an authenticated user may prevent Neutron from being able to configure networks on any compute nodes where those security groups are present, because of an Open vSwitch (OVS) firewall KeyError. All Neutron deployments utilizing neutron-openvswitch-agent are affected.
2:13.0.7+git.2021.09.27.bace3d1890-0+deb10u1
Affected by 4 other vulnerabilities.
VCID-57rk-q94h-3kgz
Aliases:
CVE-2018-14635
GHSA-x634-34m9-96mp
PYSEC-2018-93
When using the Linux bridge ml2 driver, non-privileged tenants are able to create and attach ports without specifying an IP address, bypassing IP address validation. A potential denial of service could occur if an IP address, conflicting with existing guests or routers, is then assigned from outside of the allowed allocation pool. Versions of openstack-neutron before 13.0.0.0b2, 12.0.3 and 11.0.5 are vulnerable.
2:13.0.7+git.2021.09.27.bace3d1890-0+deb10u1
Affected by 4 other vulnerabilities.
VCID-b3pu-ncrc-wbhn
Aliases:
CVE-2019-9735
GHSA-9773-3fqg-8w25
PYSEC-2019-190
An issue was discovered in the iptables firewall module in OpenStack Neutron before 10.0.8, 11.x before 11.0.7, 12.x before 12.0.6, and 13.x before 13.0.3. By setting a destination port in a security group rule along with a protocol that doesn't support that option (for example, VRRP), an authenticated user may block further application of security group rules for instances from any project/tenant on the compute hosts to which it's applied. (Only deployments using the iptables security group driver are affected.)
2:13.0.7+git.2021.09.27.bace3d1890-0+deb10u1
Affected by 4 other vulnerabilities.
VCID-ba8p-f96g-aqc3
Aliases:
CVE-2018-14636
GHSA-8q95-jj7p-x93x
PYSEC-2018-94
Live-migrated instances are briefly able to inspect traffic for other instances on the same hypervisor. This brief window could be extended indefinitely if the instance's port is set administratively down prior to live-migration and kept down after the migration is complete. This is possible due to the Open vSwitch integration bridge being connected to the instance during migration. When connected to the integration bridge, all traffic for instances using the same Open vSwitch instance would potentially be visible to the migrated guest, as the required Open vSwitch VLAN filters are only applied post-migration. Versions of openstack-neutron before 13.0.0.0b2, 12.0.3, 11.0.5 are vulnerable.
2:13.0.7+git.2021.09.27.bace3d1890-0+deb10u1
Affected by 4 other vulnerabilities.
VCID-f9bx-xknx-6qbv
Aliases:
CVE-2021-38598
GHSA-hvm4-mc7m-22w4
PYSEC-2021-360
OpenStack Neutron before 16.4.1, 17.x before 17.1.3, and 18.0.0 allows hardware address impersonation when the linuxbridge driver with ebtables-nft is used on a Netfilter-based platform. By sending carefully crafted packets, anyone in control of a server instance connected to the virtual switch can impersonate the hardware addresses of other systems on the network, resulting in denial of service or in some cases possibly interception of traffic intended for other destinations.
2:17.2.1-0+deb11u1
Affected by 1 other vulnerability.
VCID-sh88-99pv-aqac
Aliases:
CVE-2021-20267
GHSA-w8hx-f868-pvch
PYSEC-2021-136
A flaw was found in openstack-neutron's default Open vSwitch firewall rules. By sending carefully crafted packets, anyone in control of a server instance connected to the virtual switch can impersonate the IPv6 addresses of other systems on the network, resulting in denial of service or in some cases possibly interception of traffic intended for other destinations. Only deployments using the Open vSwitch driver are affected. Source: OpenStack project. Versions before openstack-neutron 15.3.3, openstack-neutron 16.3.1 and openstack-neutron 17.1.1 are affected.
2:17.2.1-0+deb11u1
Affected by 1 other vulnerability.
VCID-w7qg-pen7-tfbr
Aliases:
CVE-2021-40085
GHSA-fh73-gjvg-349c
PYSEC-2021-361
An issue was discovered in OpenStack Neutron before 16.4.1, 17.x before 17.2.1, and 18.x before 18.1.1. Authenticated attackers can reconfigure dnsmasq via a crafted extra_dhcp_opts value.
2:13.0.7+git.2021.09.27.bace3d1890-0+deb10u1
Affected by 4 other vulnerabilities.
2:17.2.1-0+deb11u1
Affected by 1 other vulnerability.
VCID-wv6g-4622-tqdw
Aliases:
CVE-2021-40797
GHSA-cpx3-696p-3cw9
PYSEC-2021-329
An issue was discovered in the routes middleware in OpenStack Neutron before 16.4.1, 17.x before 17.2.1, and 18.x before 18.1.1. By making API requests involving nonexistent controllers, an authenticated user may cause the API worker to consume increasing amounts of memory, resulting in API performance degradation or denial of service.
2:17.2.1-0+deb11u1
Affected by 1 other vulnerability.
Vulnerabilities fixed by this package (4)
Vulnerability Summary Aliases
VCID-6j79-2nz1-53cs OpenStack Neutron allows remote attackers to bypass an intended DHCP-spoofing protection mechanism The IPTables firewall in OpenStack Neutron before 7.0.4 and 8.0.0 through 8.1.0 allows remote attackers to bypass an intended DHCP-spoofing protection mechanism and consequently cause a denial of service or intercept network traffic via a crafted DHCP discovery message. CVE-2016-5362
GHSA-qpwc-p365-pqrr
VCID-7sem-1dhy-vbdw OpenStack Neutron Intended MAC-spoofing protection mechanism bypass The IPTables firewall in OpenStack Neutron up to 7.0.4 and 8.x before 8.1.0 allows remote attackers to bypass an intended MAC-spoofing protection mechanism and consequently cause a denial of service or intercept network traffic via (1) a crafted DHCP discovery message or (2) crafted non-IP traffic. CVE-2016-5363
GHSA-9pp3-cvmq-9p22
VCID-b3pu-ncrc-wbhn An issue was discovered in the iptables firewall module in OpenStack Neutron before 10.0.8, 11.x before 11.0.7, 12.x before 12.0.6, and 13.x before 13.0.3. By setting a destination port in a security group rule along with a protocol that doesn't support that option (for example, VRRP), an authenticated user may block further application of security group rules for instances from any project/tenant on the compute hosts to which it's applied. (Only deployments using the iptables security group driver are affected.) CVE-2019-9735
GHSA-9773-3fqg-8w25
PYSEC-2019-190
VCID-kv7h-v2g8-6fdj OpenStack Neutron allows remote attackers to bypass an intended ICMPv6-spoofing protection mechanism The IPTables firewall in OpenStack Neutron before 7.0.4 and 8.0.0 through 8.1.0 allows remote attackers to bypass an intended ICMPv6-spoofing protection mechanism and consequently cause a denial of service or intercept network traffic via a link-local source address. CVE-2015-8914
GHSA-3vj4-cvjp-482h

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-15T23:54:58.670105+00:00 Debian Oval Importer Affected by VCID-w7qg-pen7-tfbr https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T23:21:38.430823+00:00 Debian Oval Importer Affected by VCID-f9bx-xknx-6qbv https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T22:49:03.726875+00:00 Debian Oval Importer Affected by VCID-57rk-q94h-3kgz https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T22:33:12.009229+00:00 Debian Oval Importer Affected by VCID-wv6g-4622-tqdw https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T21:49:21.138994+00:00 Debian Oval Importer Affected by VCID-b3pu-ncrc-wbhn https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T20:38:22.088014+00:00 Debian Oval Importer Affected by VCID-sh88-99pv-aqac https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T19:23:12.288347+00:00 Debian Oval Importer Fixing VCID-7sem-1dhy-vbdw https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T17:57:02.596161+00:00 Debian Oval Importer Affected by VCID-4fyj-d9qy-fffp https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T17:20:43.842843+00:00 Debian Oval Importer Fixing VCID-kv7h-v2g8-6fdj https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T17:14:28.643556+00:00 Debian Oval Importer Fixing VCID-6j79-2nz1-53cs https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T16:53:47.153943+00:00 Debian Oval Importer Affected by VCID-ba8p-f96g-aqc3 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T14:51:41.204464+00:00 Debian Oval Importer Affected by VCID-w7qg-pen7-tfbr https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 38.4.0
2026-04-15T14:22:04.983205+00:00 Debian Oval Importer Fixing VCID-b3pu-ncrc-wbhn https://www.debian.org/security/oval/oval-definitions-stretch.xml.bz2 38.4.0
2026-04-11T23:29:14.865252+00:00 Debian Oval Importer Affected by VCID-w7qg-pen7-tfbr https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T22:57:10.874792+00:00 Debian Oval Importer Affected by VCID-f9bx-xknx-6qbv https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T22:25:31.778809+00:00 Debian Oval Importer Affected by VCID-57rk-q94h-3kgz https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T22:10:08.883585+00:00 Debian Oval Importer Affected by VCID-wv6g-4622-tqdw https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T21:27:52.960305+00:00 Debian Oval Importer Affected by VCID-b3pu-ncrc-wbhn https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T20:19:29.919858+00:00 Debian Oval Importer Affected by VCID-sh88-99pv-aqac https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T19:06:23.244930+00:00 Debian Oval Importer Fixing VCID-7sem-1dhy-vbdw https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T17:42:55.912347+00:00 Debian Oval Importer Affected by VCID-4fyj-d9qy-fffp https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T17:07:11.733473+00:00 Debian Oval Importer Fixing VCID-kv7h-v2g8-6fdj https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T17:01:03.245199+00:00 Debian Oval Importer Fixing VCID-6j79-2nz1-53cs https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T16:40:29.925062+00:00 Debian Oval Importer Affected by VCID-ba8p-f96g-aqc3 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T14:39:55.660411+00:00 Debian Oval Importer Affected by VCID-w7qg-pen7-tfbr https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 38.3.0
2026-04-11T14:10:26.871182+00:00 Debian Oval Importer Fixing VCID-b3pu-ncrc-wbhn https://www.debian.org/security/oval/oval-definitions-stretch.xml.bz2 38.3.0
2026-04-08T23:02:10.872163+00:00 Debian Oval Importer Affected by VCID-w7qg-pen7-tfbr https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T22:31:27.129555+00:00 Debian Oval Importer Affected by VCID-f9bx-xknx-6qbv https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T22:01:25.077127+00:00 Debian Oval Importer Affected by VCID-57rk-q94h-3kgz https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T21:46:40.679349+00:00 Debian Oval Importer Affected by VCID-wv6g-4622-tqdw https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T21:06:18.403999+00:00 Debian Oval Importer Affected by VCID-b3pu-ncrc-wbhn https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T20:00:17.285060+00:00 Debian Oval Importer Affected by VCID-sh88-99pv-aqac https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T18:50:40.109088+00:00 Debian Oval Importer Fixing VCID-7sem-1dhy-vbdw https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T17:30:17.616562+00:00 Debian Oval Importer Affected by VCID-4fyj-d9qy-fffp https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T16:56:22.708509+00:00 Debian Oval Importer Fixing VCID-kv7h-v2g8-6fdj https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T16:50:30.467697+00:00 Debian Oval Importer Fixing VCID-6j79-2nz1-53cs https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T16:31:03.625199+00:00 Debian Oval Importer Affected by VCID-ba8p-f96g-aqc3 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-07T23:12:57.451619+00:00 Debian Oval Importer Affected by VCID-w7qg-pen7-tfbr https://www.debian.org/security/oval/oval-definitions-buster.xml.bz2 38.1.0
2026-04-07T22:44:26.214284+00:00 Debian Oval Importer Fixing VCID-b3pu-ncrc-wbhn https://www.debian.org/security/oval/oval-definitions-stretch.xml.bz2 38.1.0