CVE-2021-40797
openstack-neutron: Routes middleware memory leak for nonexistent controllers
Severity Score
Exploit Likelihood
Affected Versions
3Public Exploits
1Exploited in Wild
-Decision
Descriptions
An issue was discovered in the routes middleware in OpenStack Neutron before 16.4.1, 17.x before 17.2.1, and 18.x before 18.1.1. By making API requests involving nonexistent controllers, an authenticated user may cause the API worker to consume increasing amounts of memory, resulting in API performance degradation or denial of service.
Se ha detectado un problema en el middleware de rutas en OpenStack Neutron versiones anteriores a 16.4.1, 17.x versiones anteriores a 17.2.1 y 18.x versiones anteriores a 18.1.1. Al llevar a cabo peticiones a la API que implican a controladores no existentes, un usuario autenticado puede causar que el trabajador de la API consuma cantidades crecientes de memoria, resultando en una degradaciĆ³n del rendimiento de la API o una denegaciĆ³n de servicio
A resource-allocation flaw was found in openstack-neutron. An authenticated attacker could make API requests involving nonexistent controllers causing the API worker to consume increasing amounts of memory. This flaw could be exploited to force API performance degradation or denial of service.
David Sinquin discovered that OpenStack Neutron incorrectly handled the default Open vSwitch firewall rules. An attacker could possibly use this issue to impersonate the IPv6 addresses of other systems on the network. This issue only affected Ubuntu 18.04 LTS, and Ubuntu 20.04 LTS. Jake Yip and Justin Mammarella discovered that OpenStack Neutron incorrectly handled the linuxbridge driver when ebtables-nft is being used. An attacker could possibly use this issue to impersonate the hardware address of other systems on the network. This issue only affected Ubuntu 18.04 LTS, and Ubuntu 20.04 LTS.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-09-08 CVE Reserved
- 2021-09-08 CVE Published
- 2024-08-04 CVE Updated
- 2024-08-04 First Exploit
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-770: Allocation of Resources Without Limits or Throttling
- CWE-772: Missing Release of Resource after Effective Lifetime
CAPEC
References (5)
URL | Tag | Source |
---|