VYPR

PyPI package

neutron

pkg:pypi/neutron

Vulnerabilities (20)

  • CVE-2024-53916HigNov 25, 2024
    affected >= 23.0.0, < 23.2.1fixed 23.2.1

    In OpenStack Neutron before 25.0.1, neutron/extensions/tagging.py can use an incorrect ID during policy enforcement. It does not apply the proper policy check for changing network tags. An unprivileged tenant is able to change (add and clear) tags on network objects that do not b

  • CVE-2023-3637Jul 25, 2023
    affected <= 22.0.2

    An uncontrolled resource consumption flaw was found in openstack-neutron. This flaw allows a remote authenticated user to query a list of security groups for an invalid project. This issue creates resources that are unconstrained by the user's quota. If a malicious user were to s

  • CVE-2022-3277Mar 6, 2023
    affected >= 19.0.0.0rc1, < 19.5.0fixed 19.5.0

    An uncontrolled resource consumption flaw was found in openstack-neutron. This flaw allows a remote authenticated user to query a list of security groups for an invalid project. This issue creates resources that are unconstrained by the user's quota. If a malicious user were to s

  • CVE-2021-40797Sep 8, 2021
    affected < 16.4.1fixed 16.4.1

    An issue was discovered in the routes middleware in OpenStack Neutron before 16.4.1, 17.x before 17.2.1, and 18.x before 18.1.1. By making API requests involving nonexistent controllers, an authenticated user may cause the API worker to consume increasing amounts of memory, resul

  • CVE-2021-40085Aug 31, 2021
    affected < 16.4.1fixed 16.4.1

    An issue was discovered in OpenStack Neutron before 16.4.1, 17.x before 17.2.1, and 18.x before 18.1.1. Authenticated attackers can reconfigure dnsmasq via a crafted extra_dhcp_opts value.

  • CVE-2021-38598Aug 23, 2021
    affected < 16.4.1fixed 16.4.1

    OpenStack Neutron before 16.4.1, 17.x before 17.1.3, and 18.0.0 allows hardware address impersonation when the linuxbridge driver with ebtables-nft is used on a Netfilter-based platform. By sending carefully crafted packets, anyone in control of a server instance connected to the

  • CVE-2021-20267May 28, 2021
    affected >= 16.0.0, < 16.3.1fixed 16.3.1

    A flaw was found in openstack-neutron's default Open vSwitch firewall rules. By sending carefully crafted packets, anyone in control of a server instance connected to the virtual switch can impersonate the IPv6 addresses of other systems on the network, resulting in denial of ser

  • CVE-2013-2255Nov 1, 2019
    affected < 7.0.0a0fixed 7.0.0a0

    HTTPSConnections in OpenStack Keystone 2013, OpenStack Compute 2013.1, and possibly other OpenStack components, fail to validate server-side SSL certificates.

  • CVE-2019-10876Apr 5, 2019
    affected >= 11.0.0, < 11.0.7fixed 11.0.7

    An issue was discovered in OpenStack Neutron 11.x before 11.0.7, 12.x before 12.0.6, and 13.x before 13.0.3. By creating two security groups with separate/overlapping port ranges, an authenticated user may prevent Neutron from being able to configure networks on any compute nodes

  • CVE-2019-9735Mar 13, 2019
    affected < 10.0.8fixed 10.0.8

    An issue was discovered in the iptables firewall module in OpenStack Neutron before 10.0.8, 11.x before 11.0.7, 12.x before 12.0.6, and 13.x before 13.0.3. By setting a destination port in a security group rule along with a protocol that doesn't support that option (for example,

  • CVE-2018-14636Sep 10, 2018
    affected >= 13.0.0.0b1, < 13.0.0.0b2fixed 13.0.0.0b2

    Live-migrated instances are briefly able to inspect traffic for other instances on the same hypervisor. This brief window could be extended indefinitely if the instance's port is set administratively down prior to live-migration and kept down after the migration is complete. This

  • CVE-2018-14635Sep 10, 2018
    affected >= 13.0.0.0b1, < 13.0.0.0b2fixed 13.0.0.0b2

    When using the Linux bridge ml2 driver, non-privileged tenants are able to create and attach ports without specifying an IP address, bypassing IP address validation. A potential denial of service could occur if an IP address, conflicting with existing guests or routers, is then a

  • CVE-2017-7543Jul 26, 2018
    affected < 7.2.0-12.1fixed 7.2.0-12.1

    A race-condition flaw was discovered in openstack-neutron before 7.2.0-12.1, 8.x before 8.3.0-11.1, 9.x before 9.3.1-2.1, and 10.x before 10.0.2-1.1, where, following a minor overcloud update, neutron security groups were disabled. Specifically, the following were reset to 0: net

  • CVE-2016-5363HigJun 17, 2016
    affected < 7.1.0fixed 7.1.0

    The IPTables firewall in OpenStack Neutron before 7.0.4 and 8.0.0 through 8.1.0 allows remote attackers to bypass an intended MAC-spoofing protection mechanism and consequently cause a denial of service or intercept network traffic via (1) a crafted DHCP discovery message or (2)

  • CVE-2016-5362HigJun 17, 2016
    affected < 7.0.5fixed 7.0.5

    The IPTables firewall in OpenStack Neutron before 7.0.4 and 8.0.0 through 8.1.0 allows remote attackers to bypass an intended DHCP-spoofing protection mechanism and consequently cause a denial of service or intercept network traffic via a crafted DHCP discovery message.

  • CVE-2015-8914CriJun 17, 2016
    affected < 7.0.5fixed 7.0.5

    The IPTables firewall in OpenStack Neutron before 7.0.4 and 8.0.0 through 8.1.0 allows remote attackers to bypass an intended ICMPv6-spoofing protection mechanism and consequently cause a denial of service or intercept network traffic via a link-local source address.

  • CVE-2015-5240Oct 27, 2015
    affected < 7.0.0fixed 7.0.0

    Race condition in OpenStack Neutron before 2014.2.4 and 2015.1 before 2015.1.2, when using the ML2 plugin or the security groups AMQP API, allows remote authenticated users to bypass IP anti-spoofing controls by changing the device owner of a port to start with network: before th

  • CVE-2015-3221Aug 26, 2015
    affected < 2014.2.4fixed 2014.2.4

    OpenStack Neutron before 2014.2.4 (juno) and 2015.1.x before 2015.1.1 (kilo), when using the IPTables firewall driver, allows remote authenticated users to cause a denial of service (L2 agent crash) by adding an address pair that is rejected by the ipset tool.

  • CVE-2014-3555Jul 23, 2014
    affected < 2013.2.4fixed 2013.2.4

    OpenStack Neutron before 2013.2.4, 2014.x before 2014.1.2, and Juno before Juno-2 allows remote authenticated users to cause a denial of service (crash or long firewall rule updates) by creating a large number of allowed address pairs.

  • CVE-2014-0056May 8, 2014
    affected >= 2012.2, < 2013.2.3fixed 2013.2.3

    The l3-agent in OpenStack Neutron 2012.2 before 2013.2.3 does not check the tenant id when creating ports, which allows remote authenticated users to plug ports into the routers of arbitrary tenants via the device id in a port-create command.