11 results (0.002 seconds)

CVSS: 6.5EPSS: 0%CPEs: 5EXPL: 0

An uncontrolled resource consumption flaw was found in openstack-neutron. This flaw allows a remote authenticated user to query a list of security groups for an invalid project. This issue creates resources that are unconstrained by the user's quota. If a malicious user were to submit a significant number of requests, this could lead to a denial of service. • https://bugs.launchpad.net/neutron/+bug/1988026 https://bugzilla.redhat.com/show_bug.cgi?id=2129193 https://access.redhat.com/security/cve/CVE-2022-3277 • CWE-400: Uncontrolled Resource Consumption •

CVSS: 6.5EPSS: 0%CPEs: 3EXPL: 1

An issue was discovered in the routes middleware in OpenStack Neutron before 16.4.1, 17.x before 17.2.1, and 18.x before 18.1.1. By making API requests involving nonexistent controllers, an authenticated user may cause the API worker to consume increasing amounts of memory, resulting in API performance degradation or denial of service. Se ha detectado un problema en el middleware de rutas en OpenStack Neutron versiones anteriores a 16.4.1, 17.x versiones anteriores a 17.2.1 y 18.x versiones anteriores a 18.1.1. Al llevar a cabo peticiones a la API que implican a controladores no existentes, un usuario autenticado puede causar que el trabajador de la API consuma cantidades crecientes de memoria, resultando en una degradación del rendimiento de la API o una denegación de servicio A resource-allocation flaw was found in openstack-neutron. An authenticated attacker could make API requests involving nonexistent controllers causing the API worker to consume increasing amounts of memory. • http://www.openwall.com/lists/oss-security/2021/09/09/2 https://launchpad.net/bugs/1942179 https://security.openstack.org/ossa/OSSA-2021-006.html https://access.redhat.com/security/cve/CVE-2021-40797 https://bugzilla.redhat.com/show_bug.cgi?id=2003248 • CWE-770: Allocation of Resources Without Limits or Throttling CWE-772: Missing Release of Resource after Effective Lifetime •

CVSS: 7.6EPSS: 0%CPEs: 6EXPL: 1

An issue was discovered in OpenStack Neutron before 16.4.1, 17.x before 17.2.1, and 18.x before 18.1.1. Authenticated attackers can reconfigure dnsmasq via a crafted extra_dhcp_opts value. Se ha detectado un problema en OpenStack Neutron versiones anteriores a 16.4.1, 17.x versiones anteriores a 17.2.1 y 18.x versiones anteriores a 18.1.1. Unos atacantes autenticados pueden reconfigurar dnsmasq por medio de un valor extra_dhcp_opts diseñado An input-validation flaw was found in openstack-neutron, where an authenticated attacker could change the dnsmasq configuration. By crafting extra_dhcp_opts values, the attacker could crash the dnsmasq, change parameters for tenants sharing the same interface, or otherwise alter that daemon’s behavior. • http://www.openwall.com/lists/oss-security/2021/08/31/2 https://launchpad.net/bugs/1939733 https://lists.debian.org/debian-lts-announce/2021/10/msg00005.html https://lists.debian.org/debian-lts-announce/2022/05/msg00038.html https://security.openstack.org/ossa/OSSA-2021-005.html https://www.debian.org/security/2021/dsa-4983 https://access.redhat.com/security/cve/CVE-2021-40085 https://bugzilla.redhat.com/show_bug.cgi?id=1998052 • CWE-20: Improper Input Validation •

CVSS: 9.1EPSS: 0%CPEs: 3EXPL: 1

OpenStack Neutron before 16.4.1, 17.x before 17.1.3, and 18.0.0 allows hardware address impersonation when the linuxbridge driver with ebtables-nft is used on a Netfilter-based platform. By sending carefully crafted packets, anyone in control of a server instance connected to the virtual switch can impersonate the hardware addresses of other systems on the network, resulting in denial of service or in some cases possibly interception of traffic intended for other destinations. OpenStack Neutron versiones anteriores a 16.4.1, 17.x versiones anteriores a 17.1.3 y 18.0.0, permite una suplantación de direcciones de hardware cuando es usado el controlador linuxbridge con ebtables-nft en una plataforma basada en Netfilter. Mediante el envío de paquetes cuidadosamente diseñados, cualquier persona que controle una instancia de servidor conectada al conmutador virtual puede suplantar las direcciones de hardware de otros sistemas en la red, resultando en una denegación de servicio o, en algunos casos, a una posible interceptación del tráfico previsto para otros destinos. • https://launchpad.net/bugs/1938670 • CWE-290: Authentication Bypass by Spoofing •

CVSS: 7.1EPSS: 0%CPEs: 7EXPL: 0

A flaw was found in openstack-neutron's default Open vSwitch firewall rules. By sending carefully crafted packets, anyone in control of a server instance connected to the virtual switch can impersonate the IPv6 addresses of other systems on the network, resulting in denial of service or in some cases possibly interception of traffic intended for other destinations. Only deployments using the Open vSwitch driver are affected. Source: OpenStack project. Versions before openstack-neutron 15.3.3, openstack-neutron 16.3.1 and openstack-neutron 17.1.1 are affected. • https://bugzilla.redhat.com/show_bug.cgi?id=1934330 https://security.openstack.org/ossa/OSSA-2021-001.html • CWE-345: Insufficient Verification of Data Authenticity •