Описание
When using the Linux bridge ml2 driver, non-privileged tenants are able to create and attach ports without specifying an IP address, bypassing IP address validation. A potential denial of service could occur if an IP address, conflicting with existing guests or routers, is then assigned from outside of the allowed allocation pool. Versions of openstack-neutron before 13.0.0.0b2, 12.0.3 and 11.0.5 are vulnerable.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | released | 2:12.0.3-0ubuntu1 |
| cosmic | not-affected | 2:13.0.0-0ubuntu4 |
| devel | not-affected | 2:13.0.0-0ubuntu4 |
| disco | not-affected | 2:13.0.0-0ubuntu4 |
| eoan | not-affected | 2:13.0.0-0ubuntu4 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was needs-triage] |
| esm-infra/bionic | released | 2:12.0.3-0ubuntu1 |
| esm-infra/focal | not-affected | 2:13.0.0-0ubuntu4 |
| esm-infra/xenial | needed | |
| focal | not-affected | 2:13.0.0-0ubuntu4 |
Показывать по
Ссылки на источники
4 Medium
CVSS2
6.5 Medium
CVSS3
Связанные уязвимости
When using the Linux bridge ml2 driver, non-privileged tenants are able to create and attach ports without specifying an IP address, bypassing IP address validation. A potential denial of service could occur if an IP address, conflicting with existing guests or routers, is then assigned from outside of the allowed allocation pool. Versions of openstack-neutron before 13.0.0.0b2, 12.0.3 and 11.0.5 are vulnerable.
When using the Linux bridge ml2 driver, non-privileged tenants are able to create and attach ports without specifying an IP address, bypassing IP address validation. A potential denial of service could occur if an IP address, conflicting with existing guests or routers, is then assigned from outside of the allowed allocation pool. Versions of openstack-neutron before 13.0.0.0b2, 12.0.3 and 11.0.5 are vulnerable.
When using the Linux bridge ml2 driver, non-privileged tenants are abl ...
OpensStack Neutron Denial of Service Vulnerability
4 Medium
CVSS2
6.5 Medium
CVSS3