Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2018-14635 (GCVE-0-2018-14635)
Vulnerability from cvelistv5 – Published: 2018-09-10 19:00 – Updated: 2024-08-05 09:38| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| The Openstack Project | openstack-neutron |
Affected:
13.0.0.0b2, 12.0.3, 11.0.5
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T09:38:12.947Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "RHSA-2018:2710",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2710"
},
{
"name": "RHSA-2018:2715",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2715"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugs.launchpad.net/neutron/+bug/1757482"
},
{
"name": "RHSA-2018:2721",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2721"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14635"
},
{
"name": "RHSA-2018:3792",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3792"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://git.openstack.org/cgit/openstack/neutron/commit/?id=54aa6e81cb17b33ce4d5d469cc11dec2869c762d"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "openstack-neutron",
"vendor": "The Openstack Project",
"versions": [
{
"status": "affected",
"version": "13.0.0.0b2, 12.0.3, 11.0.5"
}
]
}
],
"datePublic": "2018-03-21T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "When using the Linux bridge ml2 driver, non-privileged tenants are able to create and attach ports without specifying an IP address, bypassing IP address validation. A potential denial of service could occur if an IP address, conflicting with existing guests or routers, is then assigned from outside of the allowed allocation pool. Versions of openstack-neutron before 13.0.0.0b2, 12.0.3 and 11.0.5 are vulnerable."
}
],
"metrics": [
{
"cvssV3_0": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-12-06T10:57:01",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "RHSA-2018:2710",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2710"
},
{
"name": "RHSA-2018:2715",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2715"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugs.launchpad.net/neutron/+bug/1757482"
},
{
"name": "RHSA-2018:2721",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2721"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14635"
},
{
"name": "RHSA-2018:3792",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3792"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://git.openstack.org/cgit/openstack/neutron/commit/?id=54aa6e81cb17b33ce4d5d469cc11dec2869c762d"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2018-14635",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "openstack-neutron",
"version": {
"version_data": [
{
"version_value": "13.0.0.0b2, 12.0.3, 11.0.5"
}
]
}
}
]
},
"vendor_name": "The Openstack Project"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "When using the Linux bridge ml2 driver, non-privileged tenants are able to create and attach ports without specifying an IP address, bypassing IP address validation. A potential denial of service could occur if an IP address, conflicting with existing guests or routers, is then assigned from outside of the allowed allocation pool. Versions of openstack-neutron before 13.0.0.0b2, 12.0.3 and 11.0.5 are vulnerable."
}
]
},
"impact": {
"cvss": [
[
{
"vectorString": "6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
]
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-20"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "RHSA-2018:2710",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2710"
},
{
"name": "RHSA-2018:2715",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2715"
},
{
"name": "https://bugs.launchpad.net/neutron/+bug/1757482",
"refsource": "CONFIRM",
"url": "https://bugs.launchpad.net/neutron/+bug/1757482"
},
{
"name": "RHSA-2018:2721",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2721"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14635",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14635"
},
{
"name": "RHSA-2018:3792",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3792"
},
{
"name": "https://git.openstack.org/cgit/openstack/neutron/commit/?id=54aa6e81cb17b33ce4d5d469cc11dec2869c762d",
"refsource": "CONFIRM",
"url": "https://git.openstack.org/cgit/openstack/neutron/commit/?id=54aa6e81cb17b33ce4d5d469cc11dec2869c762d"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2018-14635",
"datePublished": "2018-09-10T19:00:00",
"dateReserved": "2018-07-27T00:00:00",
"dateUpdated": "2024-08-05T09:38:12.947Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E722FEF7-58A6-47AD-B1D0-DB0B71B0C7AA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4D4AC996-B340-4A14-86F7-FF83B4D5EC8F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:openstack:13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"704CFA1A-953E-4105-BFBE-406034B83DED\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:openstack:neutron:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11.0.0\", \"versionEndIncluding\": \"11.0.5\", \"matchCriteriaId\": \"E3BB2AF8-29B1-49C4-A15B-FF432B20E4B4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:openstack:neutron:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"12.0.0\", \"versionEndIncluding\": \"12.0.3\", \"matchCriteriaId\": \"F675D5F4-0FB0-4D0F-A1D7-07F808820868\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:openstack:neutron:13.0.0.0:b1:*:*:*:*:*:*\", \"matchCriteriaId\": \"DB8CB3DE-98B1-43A6-AFFB-CC469657DFE4\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"When using the Linux bridge ml2 driver, non-privileged tenants are able to create and attach ports without specifying an IP address, bypassing IP address validation. A potential denial of service could occur if an IP address, conflicting with existing guests or routers, is then assigned from outside of the allowed allocation pool. Versions of openstack-neutron before 13.0.0.0b2, 12.0.3 and 11.0.5 are vulnerable.\"}, {\"lang\": \"es\", \"value\": \"Al emplear el controlador de Linux bridge ml2, los inquilinos sin privilegios pueden crear y adjuntar puertos sin especificar una direcci\\u00f3n IP, omitiendo la validaci\\u00f3n de direcciones IP. Podr\\u00eda ocurrir una denegaci\\u00f3n de servicio (DoS) si una direcci\\u00f3n IP, en conflicto con invitados o routers existentes, se asigna desde fuera del grupo de asignaci\\u00f3n permitido. Las versiones de openstack-neutron anteriores a la 13.0.0.0b2, 12.0.3 y 11.0.5 son vulnerables.\"}]",
"id": "CVE-2018-14635",
"lastModified": "2024-11-21T03:49:28.727",
"metrics": "{\"cvssMetricV30\": [{\"source\": \"secalert@redhat.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 6.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 3.6}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 6.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:S/C:N/I:N/A:P\", \"baseScore\": 4.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"SINGLE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2018-09-10T19:29:00.313",
"references": "[{\"url\": \"https://access.redhat.com/errata/RHSA-2018:2710\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2018:2715\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2018:2721\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2018:3792\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://bugs.launchpad.net/neutron/+bug/1757482\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14635\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Issue Tracking\", \"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://git.openstack.org/cgit/openstack/neutron/commit/?id=54aa6e81cb17b33ce4d5d469cc11dec2869c762d\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2018:2710\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2018:2715\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2018:2721\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2018:3792\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://bugs.launchpad.net/neutron/+bug/1757482\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14635\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://git.openstack.org/cgit/openstack/neutron/commit/?id=54aa6e81cb17b33ce4d5d469cc11dec2869c762d\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}]",
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"secalert@redhat.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-20\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-20\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2018-14635\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2018-09-10T19:29:00.313\",\"lastModified\":\"2024-11-21T03:49:28.727\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"When using the Linux bridge ml2 driver, non-privileged tenants are able to create and attach ports without specifying an IP address, bypassing IP address validation. A potential denial of service could occur if an IP address, conflicting with existing guests or routers, is then assigned from outside of the allowed allocation pool. Versions of openstack-neutron before 13.0.0.0b2, 12.0.3 and 11.0.5 are vulnerable.\"},{\"lang\":\"es\",\"value\":\"Al emplear el controlador de Linux bridge ml2, los inquilinos sin privilegios pueden crear y adjuntar puertos sin especificar una direcci\u00f3n IP, omitiendo la validaci\u00f3n de direcciones IP. Podr\u00eda ocurrir una denegaci\u00f3n de servicio (DoS) si una direcci\u00f3n IP, en conflicto con invitados o routers existentes, se asigna desde fuera del grupo de asignaci\u00f3n permitido. Las versiones de openstack-neutron anteriores a la 13.0.0.0b2, 12.0.3 y 11.0.5 son vulnerables.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:N/I:N/A:P\",\"baseScore\":4.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E722FEF7-58A6-47AD-B1D0-DB0B71B0C7AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D4AC996-B340-4A14-86F7-FF83B4D5EC8F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openstack:13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"704CFA1A-953E-4105-BFBE-406034B83DED\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openstack:neutron:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.0.0\",\"versionEndIncluding\":\"11.0.5\",\"matchCriteriaId\":\"E3BB2AF8-29B1-49C4-A15B-FF432B20E4B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openstack:neutron:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.0.0\",\"versionEndIncluding\":\"12.0.3\",\"matchCriteriaId\":\"F675D5F4-0FB0-4D0F-A1D7-07F808820868\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openstack:neutron:13.0.0.0:b1:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB8CB3DE-98B1-43A6-AFFB-CC469657DFE4\"}]}]}],\"references\":[{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2710\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2715\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2721\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3792\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugs.launchpad.net/neutron/+bug/1757482\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14635\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://git.openstack.org/cgit/openstack/neutron/commit/?id=54aa6e81cb17b33ce4d5d469cc11dec2869c762d\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2710\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2715\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2721\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3792\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugs.launchpad.net/neutron/+bug/1757482\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14635\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://git.openstack.org/cgit/openstack/neutron/commit/?id=54aa6e81cb17b33ce4d5d469cc11dec2869c762d\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]}]}}"
}
}
RHSA-2018:2715
Vulnerability from csaf_redhat - Published: 2018-09-17 16:52 - Updated: 2025-11-21 18:06Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for openstack-neutron is now available for Red Hat OpenStack Platform 10.0 (Newton).\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OpenStack Networking (neutron) is a pluggable, scalable, and API-driven system that provisions networking services to virtual machines. Its main function is to manage connectivity to and from virtual machines.\n\nSecurity Fix(es):\n\n* openstack-neutron: A router interface out of subnet IP range results in a denial of service (CVE-2018-14635)\n\nFor more details about the security issue, including the impact, a CVSS score, and other related information, refer to the CVE page listed in the References section.\n\nBug Fix(es):\n\n* A new configuration option bridge_mac_table_size has been added for the neutron OVS agent. This value is set on every Open vSwitch bridge managed by the openvswitch-neutron-agent. The value controls the maximum number of MAC addresses that can be learned on a bridge. The default value for this new option is 50,000, which should be enough for most systems. Values outside a reasonable range (10 to 1,000,000) might be overridden by Open vSwitch. (BZ#1589031)\n\n* Previously, when a VM was destroyed, the IPv6 lease was not removed from dnsmasq lease files due to a missing dhcp_release6 binary.\n\nWith this update, the dhcp_release6 binary is now provided in an updated dnsmasq-utils package version. (BZ#1545006)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:2715",
"url": "https://access.redhat.com/errata/RHSA-2018:2715"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1404709",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1404709"
},
{
"category": "external",
"summary": "1511394",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1511394"
},
{
"category": "external",
"summary": "1532280",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1532280"
},
{
"category": "external",
"summary": "1545006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1545006"
},
{
"category": "external",
"summary": "1561907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561907"
},
{
"category": "external",
"summary": "1570908",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1570908"
},
{
"category": "external",
"summary": "1575356",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1575356"
},
{
"category": "external",
"summary": "1576256",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1576256"
},
{
"category": "external",
"summary": "1578414",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1578414"
},
{
"category": "external",
"summary": "1579400",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1579400"
},
{
"category": "external",
"summary": "1584845",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1584845"
},
{
"category": "external",
"summary": "1589031",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1589031"
},
{
"category": "external",
"summary": "1607822",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1607822"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2715.json"
}
],
"title": "Red Hat Security Advisory: openstack-neutron security and bug fix update",
"tracking": {
"current_release_date": "2025-11-21T18:06:05+00:00",
"generator": {
"date": "2025-11-21T18:06:05+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:2715",
"initial_release_date": "2018-09-17T16:52:42+00:00",
"revision_history": [
{
"date": "2018-09-17T16:52:42+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-09-17T16:52:42+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:06:05+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenStack Platform 10.0",
"product": {
"name": "Red Hat OpenStack Platform 10.0",
"product_id": "7Server-RH7-RHOS-10.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openstack:10::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenStack Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "openstack-neutron-macvtap-agent-1:9.4.1-28.el7ost.noarch",
"product": {
"name": "openstack-neutron-macvtap-agent-1:9.4.1-28.el7ost.noarch",
"product_id": "openstack-neutron-macvtap-agent-1:9.4.1-28.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-neutron-macvtap-agent@9.4.1-28.el7ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openstack-neutron-ml2-1:9.4.1-28.el7ost.noarch",
"product": {
"name": "openstack-neutron-ml2-1:9.4.1-28.el7ost.noarch",
"product_id": "openstack-neutron-ml2-1:9.4.1-28.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-neutron-ml2@9.4.1-28.el7ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openstack-neutron-sriov-nic-agent-1:9.4.1-28.el7ost.noarch",
"product": {
"name": "openstack-neutron-sriov-nic-agent-1:9.4.1-28.el7ost.noarch",
"product_id": "openstack-neutron-sriov-nic-agent-1:9.4.1-28.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-neutron-sriov-nic-agent@9.4.1-28.el7ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openstack-neutron-rpc-server-1:9.4.1-28.el7ost.noarch",
"product": {
"name": "openstack-neutron-rpc-server-1:9.4.1-28.el7ost.noarch",
"product_id": "openstack-neutron-rpc-server-1:9.4.1-28.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-neutron-rpc-server@9.4.1-28.el7ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "python-neutron-tests-1:9.4.1-28.el7ost.noarch",
"product": {
"name": "python-neutron-tests-1:9.4.1-28.el7ost.noarch",
"product_id": "python-neutron-tests-1:9.4.1-28.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-neutron-tests@9.4.1-28.el7ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "python-neutron-1:9.4.1-28.el7ost.noarch",
"product": {
"name": "python-neutron-1:9.4.1-28.el7ost.noarch",
"product_id": "python-neutron-1:9.4.1-28.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-neutron@9.4.1-28.el7ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openstack-neutron-metering-agent-1:9.4.1-28.el7ost.noarch",
"product": {
"name": "openstack-neutron-metering-agent-1:9.4.1-28.el7ost.noarch",
"product_id": "openstack-neutron-metering-agent-1:9.4.1-28.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-neutron-metering-agent@9.4.1-28.el7ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openstack-neutron-1:9.4.1-28.el7ost.noarch",
"product": {
"name": "openstack-neutron-1:9.4.1-28.el7ost.noarch",
"product_id": "openstack-neutron-1:9.4.1-28.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-neutron@9.4.1-28.el7ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openstack-neutron-common-1:9.4.1-28.el7ost.noarch",
"product": {
"name": "openstack-neutron-common-1:9.4.1-28.el7ost.noarch",
"product_id": "openstack-neutron-common-1:9.4.1-28.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-neutron-common@9.4.1-28.el7ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openstack-neutron-linuxbridge-1:9.4.1-28.el7ost.noarch",
"product": {
"name": "openstack-neutron-linuxbridge-1:9.4.1-28.el7ost.noarch",
"product_id": "openstack-neutron-linuxbridge-1:9.4.1-28.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-neutron-linuxbridge@9.4.1-28.el7ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openstack-neutron-openvswitch-1:9.4.1-28.el7ost.noarch",
"product": {
"name": "openstack-neutron-openvswitch-1:9.4.1-28.el7ost.noarch",
"product_id": "openstack-neutron-openvswitch-1:9.4.1-28.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-neutron-openvswitch@9.4.1-28.el7ost?arch=noarch\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "openstack-neutron-1:9.4.1-28.el7ost.src",
"product": {
"name": "openstack-neutron-1:9.4.1-28.el7ost.src",
"product_id": "openstack-neutron-1:9.4.1-28.el7ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-neutron@9.4.1-28.el7ost?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-neutron-1:9.4.1-28.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0",
"product_id": "7Server-RH7-RHOS-10.0:openstack-neutron-1:9.4.1-28.el7ost.noarch"
},
"product_reference": "openstack-neutron-1:9.4.1-28.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-10.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-neutron-1:9.4.1-28.el7ost.src as a component of Red Hat OpenStack Platform 10.0",
"product_id": "7Server-RH7-RHOS-10.0:openstack-neutron-1:9.4.1-28.el7ost.src"
},
"product_reference": "openstack-neutron-1:9.4.1-28.el7ost.src",
"relates_to_product_reference": "7Server-RH7-RHOS-10.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-neutron-common-1:9.4.1-28.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0",
"product_id": "7Server-RH7-RHOS-10.0:openstack-neutron-common-1:9.4.1-28.el7ost.noarch"
},
"product_reference": "openstack-neutron-common-1:9.4.1-28.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-10.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-neutron-linuxbridge-1:9.4.1-28.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0",
"product_id": "7Server-RH7-RHOS-10.0:openstack-neutron-linuxbridge-1:9.4.1-28.el7ost.noarch"
},
"product_reference": "openstack-neutron-linuxbridge-1:9.4.1-28.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-10.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-neutron-macvtap-agent-1:9.4.1-28.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0",
"product_id": "7Server-RH7-RHOS-10.0:openstack-neutron-macvtap-agent-1:9.4.1-28.el7ost.noarch"
},
"product_reference": "openstack-neutron-macvtap-agent-1:9.4.1-28.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-10.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-neutron-metering-agent-1:9.4.1-28.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0",
"product_id": "7Server-RH7-RHOS-10.0:openstack-neutron-metering-agent-1:9.4.1-28.el7ost.noarch"
},
"product_reference": "openstack-neutron-metering-agent-1:9.4.1-28.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-10.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-neutron-ml2-1:9.4.1-28.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0",
"product_id": "7Server-RH7-RHOS-10.0:openstack-neutron-ml2-1:9.4.1-28.el7ost.noarch"
},
"product_reference": "openstack-neutron-ml2-1:9.4.1-28.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-10.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-neutron-openvswitch-1:9.4.1-28.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0",
"product_id": "7Server-RH7-RHOS-10.0:openstack-neutron-openvswitch-1:9.4.1-28.el7ost.noarch"
},
"product_reference": "openstack-neutron-openvswitch-1:9.4.1-28.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-10.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-neutron-rpc-server-1:9.4.1-28.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0",
"product_id": "7Server-RH7-RHOS-10.0:openstack-neutron-rpc-server-1:9.4.1-28.el7ost.noarch"
},
"product_reference": "openstack-neutron-rpc-server-1:9.4.1-28.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-10.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-neutron-sriov-nic-agent-1:9.4.1-28.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0",
"product_id": "7Server-RH7-RHOS-10.0:openstack-neutron-sriov-nic-agent-1:9.4.1-28.el7ost.noarch"
},
"product_reference": "openstack-neutron-sriov-nic-agent-1:9.4.1-28.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-10.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-neutron-1:9.4.1-28.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0",
"product_id": "7Server-RH7-RHOS-10.0:python-neutron-1:9.4.1-28.el7ost.noarch"
},
"product_reference": "python-neutron-1:9.4.1-28.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-10.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-neutron-tests-1:9.4.1-28.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0",
"product_id": "7Server-RH7-RHOS-10.0:python-neutron-tests-1:9.4.1-28.el7ost.noarch"
},
"product_reference": "python-neutron-tests-1:9.4.1-28.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-10.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-14635",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2018-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1607822"
}
],
"notes": [
{
"category": "description",
"text": "When using the Linux bridge ml2 driver, non-privileged tenants are able to create and attach ports without specifying an IP address, bypassing IP address validation. A potential denial of service could occur if an IP address, conflicting with existing guests or routers, is then assigned from outside of the allowed allocation pool.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openstack-neutron: A router interface out of subnet IP range results in a denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOS-10.0:openstack-neutron-1:9.4.1-28.el7ost.noarch",
"7Server-RH7-RHOS-10.0:openstack-neutron-1:9.4.1-28.el7ost.src",
"7Server-RH7-RHOS-10.0:openstack-neutron-common-1:9.4.1-28.el7ost.noarch",
"7Server-RH7-RHOS-10.0:openstack-neutron-linuxbridge-1:9.4.1-28.el7ost.noarch",
"7Server-RH7-RHOS-10.0:openstack-neutron-macvtap-agent-1:9.4.1-28.el7ost.noarch",
"7Server-RH7-RHOS-10.0:openstack-neutron-metering-agent-1:9.4.1-28.el7ost.noarch",
"7Server-RH7-RHOS-10.0:openstack-neutron-ml2-1:9.4.1-28.el7ost.noarch",
"7Server-RH7-RHOS-10.0:openstack-neutron-openvswitch-1:9.4.1-28.el7ost.noarch",
"7Server-RH7-RHOS-10.0:openstack-neutron-rpc-server-1:9.4.1-28.el7ost.noarch",
"7Server-RH7-RHOS-10.0:openstack-neutron-sriov-nic-agent-1:9.4.1-28.el7ost.noarch",
"7Server-RH7-RHOS-10.0:python-neutron-1:9.4.1-28.el7ost.noarch",
"7Server-RH7-RHOS-10.0:python-neutron-tests-1:9.4.1-28.el7ost.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-14635"
},
{
"category": "external",
"summary": "RHBZ#1607822",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1607822"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-14635",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14635"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14635",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14635"
}
],
"release_date": "2018-03-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-09-17T16:52:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RH7-RHOS-10.0:openstack-neutron-1:9.4.1-28.el7ost.noarch",
"7Server-RH7-RHOS-10.0:openstack-neutron-1:9.4.1-28.el7ost.src",
"7Server-RH7-RHOS-10.0:openstack-neutron-common-1:9.4.1-28.el7ost.noarch",
"7Server-RH7-RHOS-10.0:openstack-neutron-linuxbridge-1:9.4.1-28.el7ost.noarch",
"7Server-RH7-RHOS-10.0:openstack-neutron-macvtap-agent-1:9.4.1-28.el7ost.noarch",
"7Server-RH7-RHOS-10.0:openstack-neutron-metering-agent-1:9.4.1-28.el7ost.noarch",
"7Server-RH7-RHOS-10.0:openstack-neutron-ml2-1:9.4.1-28.el7ost.noarch",
"7Server-RH7-RHOS-10.0:openstack-neutron-openvswitch-1:9.4.1-28.el7ost.noarch",
"7Server-RH7-RHOS-10.0:openstack-neutron-rpc-server-1:9.4.1-28.el7ost.noarch",
"7Server-RH7-RHOS-10.0:openstack-neutron-sriov-nic-agent-1:9.4.1-28.el7ost.noarch",
"7Server-RH7-RHOS-10.0:python-neutron-1:9.4.1-28.el7ost.noarch",
"7Server-RH7-RHOS-10.0:python-neutron-tests-1:9.4.1-28.el7ost.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2715"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-RH7-RHOS-10.0:openstack-neutron-1:9.4.1-28.el7ost.noarch",
"7Server-RH7-RHOS-10.0:openstack-neutron-1:9.4.1-28.el7ost.src",
"7Server-RH7-RHOS-10.0:openstack-neutron-common-1:9.4.1-28.el7ost.noarch",
"7Server-RH7-RHOS-10.0:openstack-neutron-linuxbridge-1:9.4.1-28.el7ost.noarch",
"7Server-RH7-RHOS-10.0:openstack-neutron-macvtap-agent-1:9.4.1-28.el7ost.noarch",
"7Server-RH7-RHOS-10.0:openstack-neutron-metering-agent-1:9.4.1-28.el7ost.noarch",
"7Server-RH7-RHOS-10.0:openstack-neutron-ml2-1:9.4.1-28.el7ost.noarch",
"7Server-RH7-RHOS-10.0:openstack-neutron-openvswitch-1:9.4.1-28.el7ost.noarch",
"7Server-RH7-RHOS-10.0:openstack-neutron-rpc-server-1:9.4.1-28.el7ost.noarch",
"7Server-RH7-RHOS-10.0:openstack-neutron-sriov-nic-agent-1:9.4.1-28.el7ost.noarch",
"7Server-RH7-RHOS-10.0:python-neutron-1:9.4.1-28.el7ost.noarch",
"7Server-RH7-RHOS-10.0:python-neutron-tests-1:9.4.1-28.el7ost.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openstack-neutron: A router interface out of subnet IP range results in a denial of service"
}
]
}
RHSA-2018:2710
Vulnerability from csaf_redhat - Published: 2018-09-17 16:47 - Updated: 2025-11-21 18:06Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for openstack-neutron is now available for Red Hat OpenStack\nPlatform 13.0 (Queens).\n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OpenStack Networking (neutron) is a pluggable, scalable, and API-driven\nsystem that provisions networking services to virtual machines. Its main\nfunction is to manage connectivity to and from virtual machines.\n\nSecurity Fix(es):\n\n* openstack-neutron: A router interface out of subnet IP range results in a denial of service (CVE-2018-14635)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, and other related information, refer to the CVE page(s) listed in\nthe References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:2710",
"url": "https://access.redhat.com/errata/RHSA-2018:2710"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1607822",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1607822"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2710.json"
}
],
"title": "Red Hat Security Advisory: openstack-neutron security update",
"tracking": {
"current_release_date": "2025-11-21T18:06:04+00:00",
"generator": {
"date": "2025-11-21T18:06:04+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:2710",
"initial_release_date": "2018-09-17T16:47:18+00:00",
"revision_history": [
{
"date": "2018-09-17T16:47:18+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-09-17T16:47:18+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:06:04+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenStack Platform 13.0",
"product": {
"name": "Red Hat OpenStack Platform 13.0",
"product_id": "7Server-RH7-RHOS-13.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openstack:13::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenStack Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "openstack-neutron-linuxbridge-1:12.0.3-5.el7ost.noarch",
"product": {
"name": "openstack-neutron-linuxbridge-1:12.0.3-5.el7ost.noarch",
"product_id": "openstack-neutron-linuxbridge-1:12.0.3-5.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-neutron-linuxbridge@12.0.3-5.el7ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openstack-neutron-openvswitch-1:12.0.3-5.el7ost.noarch",
"product": {
"name": "openstack-neutron-openvswitch-1:12.0.3-5.el7ost.noarch",
"product_id": "openstack-neutron-openvswitch-1:12.0.3-5.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-neutron-openvswitch@12.0.3-5.el7ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "python-neutron-1:12.0.3-5.el7ost.noarch",
"product": {
"name": "python-neutron-1:12.0.3-5.el7ost.noarch",
"product_id": "python-neutron-1:12.0.3-5.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-neutron@12.0.3-5.el7ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openstack-neutron-common-1:12.0.3-5.el7ost.noarch",
"product": {
"name": "openstack-neutron-common-1:12.0.3-5.el7ost.noarch",
"product_id": "openstack-neutron-common-1:12.0.3-5.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-neutron-common@12.0.3-5.el7ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openstack-neutron-ml2-1:12.0.3-5.el7ost.noarch",
"product": {
"name": "openstack-neutron-ml2-1:12.0.3-5.el7ost.noarch",
"product_id": "openstack-neutron-ml2-1:12.0.3-5.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-neutron-ml2@12.0.3-5.el7ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openstack-neutron-macvtap-agent-1:12.0.3-5.el7ost.noarch",
"product": {
"name": "openstack-neutron-macvtap-agent-1:12.0.3-5.el7ost.noarch",
"product_id": "openstack-neutron-macvtap-agent-1:12.0.3-5.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-neutron-macvtap-agent@12.0.3-5.el7ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openstack-neutron-rpc-server-1:12.0.3-5.el7ost.noarch",
"product": {
"name": "openstack-neutron-rpc-server-1:12.0.3-5.el7ost.noarch",
"product_id": "openstack-neutron-rpc-server-1:12.0.3-5.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-neutron-rpc-server@12.0.3-5.el7ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openstack-neutron-1:12.0.3-5.el7ost.noarch",
"product": {
"name": "openstack-neutron-1:12.0.3-5.el7ost.noarch",
"product_id": "openstack-neutron-1:12.0.3-5.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-neutron@12.0.3-5.el7ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openstack-neutron-metering-agent-1:12.0.3-5.el7ost.noarch",
"product": {
"name": "openstack-neutron-metering-agent-1:12.0.3-5.el7ost.noarch",
"product_id": "openstack-neutron-metering-agent-1:12.0.3-5.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-neutron-metering-agent@12.0.3-5.el7ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openstack-neutron-sriov-nic-agent-1:12.0.3-5.el7ost.noarch",
"product": {
"name": "openstack-neutron-sriov-nic-agent-1:12.0.3-5.el7ost.noarch",
"product_id": "openstack-neutron-sriov-nic-agent-1:12.0.3-5.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-neutron-sriov-nic-agent@12.0.3-5.el7ost?arch=noarch\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "openstack-neutron-1:12.0.3-5.el7ost.src",
"product": {
"name": "openstack-neutron-1:12.0.3-5.el7ost.src",
"product_id": "openstack-neutron-1:12.0.3-5.el7ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-neutron@12.0.3-5.el7ost?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-neutron-1:12.0.3-5.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0",
"product_id": "7Server-RH7-RHOS-13.0:openstack-neutron-1:12.0.3-5.el7ost.noarch"
},
"product_reference": "openstack-neutron-1:12.0.3-5.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-13.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-neutron-1:12.0.3-5.el7ost.src as a component of Red Hat OpenStack Platform 13.0",
"product_id": "7Server-RH7-RHOS-13.0:openstack-neutron-1:12.0.3-5.el7ost.src"
},
"product_reference": "openstack-neutron-1:12.0.3-5.el7ost.src",
"relates_to_product_reference": "7Server-RH7-RHOS-13.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-neutron-common-1:12.0.3-5.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0",
"product_id": "7Server-RH7-RHOS-13.0:openstack-neutron-common-1:12.0.3-5.el7ost.noarch"
},
"product_reference": "openstack-neutron-common-1:12.0.3-5.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-13.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-neutron-linuxbridge-1:12.0.3-5.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0",
"product_id": "7Server-RH7-RHOS-13.0:openstack-neutron-linuxbridge-1:12.0.3-5.el7ost.noarch"
},
"product_reference": "openstack-neutron-linuxbridge-1:12.0.3-5.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-13.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-neutron-macvtap-agent-1:12.0.3-5.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0",
"product_id": "7Server-RH7-RHOS-13.0:openstack-neutron-macvtap-agent-1:12.0.3-5.el7ost.noarch"
},
"product_reference": "openstack-neutron-macvtap-agent-1:12.0.3-5.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-13.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-neutron-metering-agent-1:12.0.3-5.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0",
"product_id": "7Server-RH7-RHOS-13.0:openstack-neutron-metering-agent-1:12.0.3-5.el7ost.noarch"
},
"product_reference": "openstack-neutron-metering-agent-1:12.0.3-5.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-13.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-neutron-ml2-1:12.0.3-5.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0",
"product_id": "7Server-RH7-RHOS-13.0:openstack-neutron-ml2-1:12.0.3-5.el7ost.noarch"
},
"product_reference": "openstack-neutron-ml2-1:12.0.3-5.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-13.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-neutron-openvswitch-1:12.0.3-5.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0",
"product_id": "7Server-RH7-RHOS-13.0:openstack-neutron-openvswitch-1:12.0.3-5.el7ost.noarch"
},
"product_reference": "openstack-neutron-openvswitch-1:12.0.3-5.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-13.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-neutron-rpc-server-1:12.0.3-5.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0",
"product_id": "7Server-RH7-RHOS-13.0:openstack-neutron-rpc-server-1:12.0.3-5.el7ost.noarch"
},
"product_reference": "openstack-neutron-rpc-server-1:12.0.3-5.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-13.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-neutron-sriov-nic-agent-1:12.0.3-5.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0",
"product_id": "7Server-RH7-RHOS-13.0:openstack-neutron-sriov-nic-agent-1:12.0.3-5.el7ost.noarch"
},
"product_reference": "openstack-neutron-sriov-nic-agent-1:12.0.3-5.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-13.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-neutron-1:12.0.3-5.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0",
"product_id": "7Server-RH7-RHOS-13.0:python-neutron-1:12.0.3-5.el7ost.noarch"
},
"product_reference": "python-neutron-1:12.0.3-5.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-13.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-14635",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2018-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1607822"
}
],
"notes": [
{
"category": "description",
"text": "When using the Linux bridge ml2 driver, non-privileged tenants are able to create and attach ports without specifying an IP address, bypassing IP address validation. A potential denial of service could occur if an IP address, conflicting with existing guests or routers, is then assigned from outside of the allowed allocation pool.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openstack-neutron: A router interface out of subnet IP range results in a denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOS-13.0:openstack-neutron-1:12.0.3-5.el7ost.noarch",
"7Server-RH7-RHOS-13.0:openstack-neutron-1:12.0.3-5.el7ost.src",
"7Server-RH7-RHOS-13.0:openstack-neutron-common-1:12.0.3-5.el7ost.noarch",
"7Server-RH7-RHOS-13.0:openstack-neutron-linuxbridge-1:12.0.3-5.el7ost.noarch",
"7Server-RH7-RHOS-13.0:openstack-neutron-macvtap-agent-1:12.0.3-5.el7ost.noarch",
"7Server-RH7-RHOS-13.0:openstack-neutron-metering-agent-1:12.0.3-5.el7ost.noarch",
"7Server-RH7-RHOS-13.0:openstack-neutron-ml2-1:12.0.3-5.el7ost.noarch",
"7Server-RH7-RHOS-13.0:openstack-neutron-openvswitch-1:12.0.3-5.el7ost.noarch",
"7Server-RH7-RHOS-13.0:openstack-neutron-rpc-server-1:12.0.3-5.el7ost.noarch",
"7Server-RH7-RHOS-13.0:openstack-neutron-sriov-nic-agent-1:12.0.3-5.el7ost.noarch",
"7Server-RH7-RHOS-13.0:python-neutron-1:12.0.3-5.el7ost.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-14635"
},
{
"category": "external",
"summary": "RHBZ#1607822",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1607822"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-14635",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14635"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14635",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14635"
}
],
"release_date": "2018-03-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-09-17T16:47:18+00:00",
"details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RH7-RHOS-13.0:openstack-neutron-1:12.0.3-5.el7ost.noarch",
"7Server-RH7-RHOS-13.0:openstack-neutron-1:12.0.3-5.el7ost.src",
"7Server-RH7-RHOS-13.0:openstack-neutron-common-1:12.0.3-5.el7ost.noarch",
"7Server-RH7-RHOS-13.0:openstack-neutron-linuxbridge-1:12.0.3-5.el7ost.noarch",
"7Server-RH7-RHOS-13.0:openstack-neutron-macvtap-agent-1:12.0.3-5.el7ost.noarch",
"7Server-RH7-RHOS-13.0:openstack-neutron-metering-agent-1:12.0.3-5.el7ost.noarch",
"7Server-RH7-RHOS-13.0:openstack-neutron-ml2-1:12.0.3-5.el7ost.noarch",
"7Server-RH7-RHOS-13.0:openstack-neutron-openvswitch-1:12.0.3-5.el7ost.noarch",
"7Server-RH7-RHOS-13.0:openstack-neutron-rpc-server-1:12.0.3-5.el7ost.noarch",
"7Server-RH7-RHOS-13.0:openstack-neutron-sriov-nic-agent-1:12.0.3-5.el7ost.noarch",
"7Server-RH7-RHOS-13.0:python-neutron-1:12.0.3-5.el7ost.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2710"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-RH7-RHOS-13.0:openstack-neutron-1:12.0.3-5.el7ost.noarch",
"7Server-RH7-RHOS-13.0:openstack-neutron-1:12.0.3-5.el7ost.src",
"7Server-RH7-RHOS-13.0:openstack-neutron-common-1:12.0.3-5.el7ost.noarch",
"7Server-RH7-RHOS-13.0:openstack-neutron-linuxbridge-1:12.0.3-5.el7ost.noarch",
"7Server-RH7-RHOS-13.0:openstack-neutron-macvtap-agent-1:12.0.3-5.el7ost.noarch",
"7Server-RH7-RHOS-13.0:openstack-neutron-metering-agent-1:12.0.3-5.el7ost.noarch",
"7Server-RH7-RHOS-13.0:openstack-neutron-ml2-1:12.0.3-5.el7ost.noarch",
"7Server-RH7-RHOS-13.0:openstack-neutron-openvswitch-1:12.0.3-5.el7ost.noarch",
"7Server-RH7-RHOS-13.0:openstack-neutron-rpc-server-1:12.0.3-5.el7ost.noarch",
"7Server-RH7-RHOS-13.0:openstack-neutron-sriov-nic-agent-1:12.0.3-5.el7ost.noarch",
"7Server-RH7-RHOS-13.0:python-neutron-1:12.0.3-5.el7ost.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openstack-neutron: A router interface out of subnet IP range results in a denial of service"
}
]
}
RHSA-2018:3792
Vulnerability from csaf_redhat - Published: 2018-12-05 18:51 - Updated: 2025-11-21 18:07Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for openstack-neutron is now available for Red Hat OpenStack Platform 12.0 (Pike).\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OpenStack Networking (neutron) is a pluggable, scalable, and API-driven system that provisions networking services to virtual machines. Its main function is to manage connectivity to and from virtual machines.\n\nSecurity Fix(es):\n\n* openstack-neutron: A router interface out of subnet IP range results in a denial of service (CVE-2018-14635)\n\nFor more details about the security issues, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE pages listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:3792",
"url": "https://access.redhat.com/errata/RHSA-2018:3792"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1530131",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1530131"
},
{
"category": "external",
"summary": "1539638",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1539638"
},
{
"category": "external",
"summary": "1607822",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1607822"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_3792.json"
}
],
"title": "Red Hat Security Advisory: openstack-neutron security update",
"tracking": {
"current_release_date": "2025-11-21T18:07:09+00:00",
"generator": {
"date": "2025-11-21T18:07:09+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2018:3792",
"initial_release_date": "2018-12-05T18:51:51+00:00",
"revision_history": [
{
"date": "2018-12-05T18:51:51+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-12-05T18:51:51+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:07:09+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenStack Platform 12.0",
"product": {
"name": "Red Hat OpenStack Platform 12.0",
"product_id": "7Server-RH7-RHOS-12.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openstack:12::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenStack Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "openstack-neutron-sriov-nic-agent-1:11.0.4-6.el7ost.noarch",
"product": {
"name": "openstack-neutron-sriov-nic-agent-1:11.0.4-6.el7ost.noarch",
"product_id": "openstack-neutron-sriov-nic-agent-1:11.0.4-6.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-neutron-sriov-nic-agent@11.0.4-6.el7ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "python-neutron-1:11.0.4-6.el7ost.noarch",
"product": {
"name": "python-neutron-1:11.0.4-6.el7ost.noarch",
"product_id": "python-neutron-1:11.0.4-6.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-neutron@11.0.4-6.el7ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openstack-neutron-metering-agent-1:11.0.4-6.el7ost.noarch",
"product": {
"name": "openstack-neutron-metering-agent-1:11.0.4-6.el7ost.noarch",
"product_id": "openstack-neutron-metering-agent-1:11.0.4-6.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-neutron-metering-agent@11.0.4-6.el7ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "python-neutron-tests-1:11.0.4-6.el7ost.noarch",
"product": {
"name": "python-neutron-tests-1:11.0.4-6.el7ost.noarch",
"product_id": "python-neutron-tests-1:11.0.4-6.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-neutron-tests@11.0.4-6.el7ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openstack-neutron-openvswitch-1:11.0.4-6.el7ost.noarch",
"product": {
"name": "openstack-neutron-openvswitch-1:11.0.4-6.el7ost.noarch",
"product_id": "openstack-neutron-openvswitch-1:11.0.4-6.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-neutron-openvswitch@11.0.4-6.el7ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openstack-neutron-rpc-server-1:11.0.4-6.el7ost.noarch",
"product": {
"name": "openstack-neutron-rpc-server-1:11.0.4-6.el7ost.noarch",
"product_id": "openstack-neutron-rpc-server-1:11.0.4-6.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-neutron-rpc-server@11.0.4-6.el7ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openstack-neutron-ml2-1:11.0.4-6.el7ost.noarch",
"product": {
"name": "openstack-neutron-ml2-1:11.0.4-6.el7ost.noarch",
"product_id": "openstack-neutron-ml2-1:11.0.4-6.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-neutron-ml2@11.0.4-6.el7ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openstack-neutron-macvtap-agent-1:11.0.4-6.el7ost.noarch",
"product": {
"name": "openstack-neutron-macvtap-agent-1:11.0.4-6.el7ost.noarch",
"product_id": "openstack-neutron-macvtap-agent-1:11.0.4-6.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-neutron-macvtap-agent@11.0.4-6.el7ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openstack-neutron-1:11.0.4-6.el7ost.noarch",
"product": {
"name": "openstack-neutron-1:11.0.4-6.el7ost.noarch",
"product_id": "openstack-neutron-1:11.0.4-6.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-neutron@11.0.4-6.el7ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openstack-neutron-common-1:11.0.4-6.el7ost.noarch",
"product": {
"name": "openstack-neutron-common-1:11.0.4-6.el7ost.noarch",
"product_id": "openstack-neutron-common-1:11.0.4-6.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-neutron-common@11.0.4-6.el7ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openstack-neutron-linuxbridge-1:11.0.4-6.el7ost.noarch",
"product": {
"name": "openstack-neutron-linuxbridge-1:11.0.4-6.el7ost.noarch",
"product_id": "openstack-neutron-linuxbridge-1:11.0.4-6.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-neutron-linuxbridge@11.0.4-6.el7ost?arch=noarch\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "openstack-neutron-1:11.0.4-6.el7ost.src",
"product": {
"name": "openstack-neutron-1:11.0.4-6.el7ost.src",
"product_id": "openstack-neutron-1:11.0.4-6.el7ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-neutron@11.0.4-6.el7ost?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-neutron-1:11.0.4-6.el7ost.noarch as a component of Red Hat OpenStack Platform 12.0",
"product_id": "7Server-RH7-RHOS-12.0:openstack-neutron-1:11.0.4-6.el7ost.noarch"
},
"product_reference": "openstack-neutron-1:11.0.4-6.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-12.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-neutron-1:11.0.4-6.el7ost.src as a component of Red Hat OpenStack Platform 12.0",
"product_id": "7Server-RH7-RHOS-12.0:openstack-neutron-1:11.0.4-6.el7ost.src"
},
"product_reference": "openstack-neutron-1:11.0.4-6.el7ost.src",
"relates_to_product_reference": "7Server-RH7-RHOS-12.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-neutron-common-1:11.0.4-6.el7ost.noarch as a component of Red Hat OpenStack Platform 12.0",
"product_id": "7Server-RH7-RHOS-12.0:openstack-neutron-common-1:11.0.4-6.el7ost.noarch"
},
"product_reference": "openstack-neutron-common-1:11.0.4-6.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-12.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-neutron-linuxbridge-1:11.0.4-6.el7ost.noarch as a component of Red Hat OpenStack Platform 12.0",
"product_id": "7Server-RH7-RHOS-12.0:openstack-neutron-linuxbridge-1:11.0.4-6.el7ost.noarch"
},
"product_reference": "openstack-neutron-linuxbridge-1:11.0.4-6.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-12.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-neutron-macvtap-agent-1:11.0.4-6.el7ost.noarch as a component of Red Hat OpenStack Platform 12.0",
"product_id": "7Server-RH7-RHOS-12.0:openstack-neutron-macvtap-agent-1:11.0.4-6.el7ost.noarch"
},
"product_reference": "openstack-neutron-macvtap-agent-1:11.0.4-6.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-12.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-neutron-metering-agent-1:11.0.4-6.el7ost.noarch as a component of Red Hat OpenStack Platform 12.0",
"product_id": "7Server-RH7-RHOS-12.0:openstack-neutron-metering-agent-1:11.0.4-6.el7ost.noarch"
},
"product_reference": "openstack-neutron-metering-agent-1:11.0.4-6.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-12.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-neutron-ml2-1:11.0.4-6.el7ost.noarch as a component of Red Hat OpenStack Platform 12.0",
"product_id": "7Server-RH7-RHOS-12.0:openstack-neutron-ml2-1:11.0.4-6.el7ost.noarch"
},
"product_reference": "openstack-neutron-ml2-1:11.0.4-6.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-12.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-neutron-openvswitch-1:11.0.4-6.el7ost.noarch as a component of Red Hat OpenStack Platform 12.0",
"product_id": "7Server-RH7-RHOS-12.0:openstack-neutron-openvswitch-1:11.0.4-6.el7ost.noarch"
},
"product_reference": "openstack-neutron-openvswitch-1:11.0.4-6.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-12.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-neutron-rpc-server-1:11.0.4-6.el7ost.noarch as a component of Red Hat OpenStack Platform 12.0",
"product_id": "7Server-RH7-RHOS-12.0:openstack-neutron-rpc-server-1:11.0.4-6.el7ost.noarch"
},
"product_reference": "openstack-neutron-rpc-server-1:11.0.4-6.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-12.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-neutron-sriov-nic-agent-1:11.0.4-6.el7ost.noarch as a component of Red Hat OpenStack Platform 12.0",
"product_id": "7Server-RH7-RHOS-12.0:openstack-neutron-sriov-nic-agent-1:11.0.4-6.el7ost.noarch"
},
"product_reference": "openstack-neutron-sriov-nic-agent-1:11.0.4-6.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-12.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-neutron-1:11.0.4-6.el7ost.noarch as a component of Red Hat OpenStack Platform 12.0",
"product_id": "7Server-RH7-RHOS-12.0:python-neutron-1:11.0.4-6.el7ost.noarch"
},
"product_reference": "python-neutron-1:11.0.4-6.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-12.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-neutron-tests-1:11.0.4-6.el7ost.noarch as a component of Red Hat OpenStack Platform 12.0",
"product_id": "7Server-RH7-RHOS-12.0:python-neutron-tests-1:11.0.4-6.el7ost.noarch"
},
"product_reference": "python-neutron-tests-1:11.0.4-6.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-12.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-14635",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2018-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1607822"
}
],
"notes": [
{
"category": "description",
"text": "When using the Linux bridge ml2 driver, non-privileged tenants are able to create and attach ports without specifying an IP address, bypassing IP address validation. A potential denial of service could occur if an IP address, conflicting with existing guests or routers, is then assigned from outside of the allowed allocation pool.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openstack-neutron: A router interface out of subnet IP range results in a denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOS-12.0:openstack-neutron-1:11.0.4-6.el7ost.noarch",
"7Server-RH7-RHOS-12.0:openstack-neutron-1:11.0.4-6.el7ost.src",
"7Server-RH7-RHOS-12.0:openstack-neutron-common-1:11.0.4-6.el7ost.noarch",
"7Server-RH7-RHOS-12.0:openstack-neutron-linuxbridge-1:11.0.4-6.el7ost.noarch",
"7Server-RH7-RHOS-12.0:openstack-neutron-macvtap-agent-1:11.0.4-6.el7ost.noarch",
"7Server-RH7-RHOS-12.0:openstack-neutron-metering-agent-1:11.0.4-6.el7ost.noarch",
"7Server-RH7-RHOS-12.0:openstack-neutron-ml2-1:11.0.4-6.el7ost.noarch",
"7Server-RH7-RHOS-12.0:openstack-neutron-openvswitch-1:11.0.4-6.el7ost.noarch",
"7Server-RH7-RHOS-12.0:openstack-neutron-rpc-server-1:11.0.4-6.el7ost.noarch",
"7Server-RH7-RHOS-12.0:openstack-neutron-sriov-nic-agent-1:11.0.4-6.el7ost.noarch",
"7Server-RH7-RHOS-12.0:python-neutron-1:11.0.4-6.el7ost.noarch",
"7Server-RH7-RHOS-12.0:python-neutron-tests-1:11.0.4-6.el7ost.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-14635"
},
{
"category": "external",
"summary": "RHBZ#1607822",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1607822"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-14635",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14635"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14635",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14635"
}
],
"release_date": "2018-03-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-12-05T18:51:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RH7-RHOS-12.0:openstack-neutron-1:11.0.4-6.el7ost.noarch",
"7Server-RH7-RHOS-12.0:openstack-neutron-1:11.0.4-6.el7ost.src",
"7Server-RH7-RHOS-12.0:openstack-neutron-common-1:11.0.4-6.el7ost.noarch",
"7Server-RH7-RHOS-12.0:openstack-neutron-linuxbridge-1:11.0.4-6.el7ost.noarch",
"7Server-RH7-RHOS-12.0:openstack-neutron-macvtap-agent-1:11.0.4-6.el7ost.noarch",
"7Server-RH7-RHOS-12.0:openstack-neutron-metering-agent-1:11.0.4-6.el7ost.noarch",
"7Server-RH7-RHOS-12.0:openstack-neutron-ml2-1:11.0.4-6.el7ost.noarch",
"7Server-RH7-RHOS-12.0:openstack-neutron-openvswitch-1:11.0.4-6.el7ost.noarch",
"7Server-RH7-RHOS-12.0:openstack-neutron-rpc-server-1:11.0.4-6.el7ost.noarch",
"7Server-RH7-RHOS-12.0:openstack-neutron-sriov-nic-agent-1:11.0.4-6.el7ost.noarch",
"7Server-RH7-RHOS-12.0:python-neutron-1:11.0.4-6.el7ost.noarch",
"7Server-RH7-RHOS-12.0:python-neutron-tests-1:11.0.4-6.el7ost.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:3792"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-RH7-RHOS-12.0:openstack-neutron-1:11.0.4-6.el7ost.noarch",
"7Server-RH7-RHOS-12.0:openstack-neutron-1:11.0.4-6.el7ost.src",
"7Server-RH7-RHOS-12.0:openstack-neutron-common-1:11.0.4-6.el7ost.noarch",
"7Server-RH7-RHOS-12.0:openstack-neutron-linuxbridge-1:11.0.4-6.el7ost.noarch",
"7Server-RH7-RHOS-12.0:openstack-neutron-macvtap-agent-1:11.0.4-6.el7ost.noarch",
"7Server-RH7-RHOS-12.0:openstack-neutron-metering-agent-1:11.0.4-6.el7ost.noarch",
"7Server-RH7-RHOS-12.0:openstack-neutron-ml2-1:11.0.4-6.el7ost.noarch",
"7Server-RH7-RHOS-12.0:openstack-neutron-openvswitch-1:11.0.4-6.el7ost.noarch",
"7Server-RH7-RHOS-12.0:openstack-neutron-rpc-server-1:11.0.4-6.el7ost.noarch",
"7Server-RH7-RHOS-12.0:openstack-neutron-sriov-nic-agent-1:11.0.4-6.el7ost.noarch",
"7Server-RH7-RHOS-12.0:python-neutron-1:11.0.4-6.el7ost.noarch",
"7Server-RH7-RHOS-12.0:python-neutron-tests-1:11.0.4-6.el7ost.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openstack-neutron: A router interface out of subnet IP range results in a denial of service"
}
]
}
RHSA-2018_2710
Vulnerability from csaf_redhat - Published: 2018-09-17 16:47 - Updated: 2024-11-15 00:34Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for openstack-neutron is now available for Red Hat OpenStack\nPlatform 13.0 (Queens).\n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OpenStack Networking (neutron) is a pluggable, scalable, and API-driven\nsystem that provisions networking services to virtual machines. Its main\nfunction is to manage connectivity to and from virtual machines.\n\nSecurity Fix(es):\n\n* openstack-neutron: A router interface out of subnet IP range results in a denial of service (CVE-2018-14635)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, and other related information, refer to the CVE page(s) listed in\nthe References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:2710",
"url": "https://access.redhat.com/errata/RHSA-2018:2710"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1607822",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1607822"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2710.json"
}
],
"title": "Red Hat Security Advisory: openstack-neutron security update",
"tracking": {
"current_release_date": "2024-11-15T00:34:56+00:00",
"generator": {
"date": "2024-11-15T00:34:56+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2018:2710",
"initial_release_date": "2018-09-17T16:47:18+00:00",
"revision_history": [
{
"date": "2018-09-17T16:47:18+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-09-17T16:47:18+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T00:34:56+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenStack Platform 13.0",
"product": {
"name": "Red Hat OpenStack Platform 13.0",
"product_id": "7Server-RH7-RHOS-13.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openstack:13::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenStack Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "openstack-neutron-linuxbridge-1:12.0.3-5.el7ost.noarch",
"product": {
"name": "openstack-neutron-linuxbridge-1:12.0.3-5.el7ost.noarch",
"product_id": "openstack-neutron-linuxbridge-1:12.0.3-5.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-neutron-linuxbridge@12.0.3-5.el7ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openstack-neutron-openvswitch-1:12.0.3-5.el7ost.noarch",
"product": {
"name": "openstack-neutron-openvswitch-1:12.0.3-5.el7ost.noarch",
"product_id": "openstack-neutron-openvswitch-1:12.0.3-5.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-neutron-openvswitch@12.0.3-5.el7ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "python-neutron-1:12.0.3-5.el7ost.noarch",
"product": {
"name": "python-neutron-1:12.0.3-5.el7ost.noarch",
"product_id": "python-neutron-1:12.0.3-5.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-neutron@12.0.3-5.el7ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openstack-neutron-common-1:12.0.3-5.el7ost.noarch",
"product": {
"name": "openstack-neutron-common-1:12.0.3-5.el7ost.noarch",
"product_id": "openstack-neutron-common-1:12.0.3-5.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-neutron-common@12.0.3-5.el7ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openstack-neutron-ml2-1:12.0.3-5.el7ost.noarch",
"product": {
"name": "openstack-neutron-ml2-1:12.0.3-5.el7ost.noarch",
"product_id": "openstack-neutron-ml2-1:12.0.3-5.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-neutron-ml2@12.0.3-5.el7ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openstack-neutron-macvtap-agent-1:12.0.3-5.el7ost.noarch",
"product": {
"name": "openstack-neutron-macvtap-agent-1:12.0.3-5.el7ost.noarch",
"product_id": "openstack-neutron-macvtap-agent-1:12.0.3-5.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-neutron-macvtap-agent@12.0.3-5.el7ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openstack-neutron-rpc-server-1:12.0.3-5.el7ost.noarch",
"product": {
"name": "openstack-neutron-rpc-server-1:12.0.3-5.el7ost.noarch",
"product_id": "openstack-neutron-rpc-server-1:12.0.3-5.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-neutron-rpc-server@12.0.3-5.el7ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openstack-neutron-1:12.0.3-5.el7ost.noarch",
"product": {
"name": "openstack-neutron-1:12.0.3-5.el7ost.noarch",
"product_id": "openstack-neutron-1:12.0.3-5.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-neutron@12.0.3-5.el7ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openstack-neutron-metering-agent-1:12.0.3-5.el7ost.noarch",
"product": {
"name": "openstack-neutron-metering-agent-1:12.0.3-5.el7ost.noarch",
"product_id": "openstack-neutron-metering-agent-1:12.0.3-5.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-neutron-metering-agent@12.0.3-5.el7ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openstack-neutron-sriov-nic-agent-1:12.0.3-5.el7ost.noarch",
"product": {
"name": "openstack-neutron-sriov-nic-agent-1:12.0.3-5.el7ost.noarch",
"product_id": "openstack-neutron-sriov-nic-agent-1:12.0.3-5.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-neutron-sriov-nic-agent@12.0.3-5.el7ost?arch=noarch\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "openstack-neutron-1:12.0.3-5.el7ost.src",
"product": {
"name": "openstack-neutron-1:12.0.3-5.el7ost.src",
"product_id": "openstack-neutron-1:12.0.3-5.el7ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-neutron@12.0.3-5.el7ost?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-neutron-1:12.0.3-5.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0",
"product_id": "7Server-RH7-RHOS-13.0:openstack-neutron-1:12.0.3-5.el7ost.noarch"
},
"product_reference": "openstack-neutron-1:12.0.3-5.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-13.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-neutron-1:12.0.3-5.el7ost.src as a component of Red Hat OpenStack Platform 13.0",
"product_id": "7Server-RH7-RHOS-13.0:openstack-neutron-1:12.0.3-5.el7ost.src"
},
"product_reference": "openstack-neutron-1:12.0.3-5.el7ost.src",
"relates_to_product_reference": "7Server-RH7-RHOS-13.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-neutron-common-1:12.0.3-5.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0",
"product_id": "7Server-RH7-RHOS-13.0:openstack-neutron-common-1:12.0.3-5.el7ost.noarch"
},
"product_reference": "openstack-neutron-common-1:12.0.3-5.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-13.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-neutron-linuxbridge-1:12.0.3-5.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0",
"product_id": "7Server-RH7-RHOS-13.0:openstack-neutron-linuxbridge-1:12.0.3-5.el7ost.noarch"
},
"product_reference": "openstack-neutron-linuxbridge-1:12.0.3-5.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-13.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-neutron-macvtap-agent-1:12.0.3-5.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0",
"product_id": "7Server-RH7-RHOS-13.0:openstack-neutron-macvtap-agent-1:12.0.3-5.el7ost.noarch"
},
"product_reference": "openstack-neutron-macvtap-agent-1:12.0.3-5.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-13.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-neutron-metering-agent-1:12.0.3-5.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0",
"product_id": "7Server-RH7-RHOS-13.0:openstack-neutron-metering-agent-1:12.0.3-5.el7ost.noarch"
},
"product_reference": "openstack-neutron-metering-agent-1:12.0.3-5.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-13.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-neutron-ml2-1:12.0.3-5.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0",
"product_id": "7Server-RH7-RHOS-13.0:openstack-neutron-ml2-1:12.0.3-5.el7ost.noarch"
},
"product_reference": "openstack-neutron-ml2-1:12.0.3-5.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-13.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-neutron-openvswitch-1:12.0.3-5.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0",
"product_id": "7Server-RH7-RHOS-13.0:openstack-neutron-openvswitch-1:12.0.3-5.el7ost.noarch"
},
"product_reference": "openstack-neutron-openvswitch-1:12.0.3-5.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-13.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-neutron-rpc-server-1:12.0.3-5.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0",
"product_id": "7Server-RH7-RHOS-13.0:openstack-neutron-rpc-server-1:12.0.3-5.el7ost.noarch"
},
"product_reference": "openstack-neutron-rpc-server-1:12.0.3-5.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-13.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-neutron-sriov-nic-agent-1:12.0.3-5.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0",
"product_id": "7Server-RH7-RHOS-13.0:openstack-neutron-sriov-nic-agent-1:12.0.3-5.el7ost.noarch"
},
"product_reference": "openstack-neutron-sriov-nic-agent-1:12.0.3-5.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-13.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-neutron-1:12.0.3-5.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0",
"product_id": "7Server-RH7-RHOS-13.0:python-neutron-1:12.0.3-5.el7ost.noarch"
},
"product_reference": "python-neutron-1:12.0.3-5.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-13.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-14635",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2018-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1607822"
}
],
"notes": [
{
"category": "description",
"text": "When using the Linux bridge ml2 driver, non-privileged tenants are able to create and attach ports without specifying an IP address, bypassing IP address validation. A potential denial of service could occur if an IP address, conflicting with existing guests or routers, is then assigned from outside of the allowed allocation pool.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openstack-neutron: A router interface out of subnet IP range results in a denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOS-13.0:openstack-neutron-1:12.0.3-5.el7ost.noarch",
"7Server-RH7-RHOS-13.0:openstack-neutron-1:12.0.3-5.el7ost.src",
"7Server-RH7-RHOS-13.0:openstack-neutron-common-1:12.0.3-5.el7ost.noarch",
"7Server-RH7-RHOS-13.0:openstack-neutron-linuxbridge-1:12.0.3-5.el7ost.noarch",
"7Server-RH7-RHOS-13.0:openstack-neutron-macvtap-agent-1:12.0.3-5.el7ost.noarch",
"7Server-RH7-RHOS-13.0:openstack-neutron-metering-agent-1:12.0.3-5.el7ost.noarch",
"7Server-RH7-RHOS-13.0:openstack-neutron-ml2-1:12.0.3-5.el7ost.noarch",
"7Server-RH7-RHOS-13.0:openstack-neutron-openvswitch-1:12.0.3-5.el7ost.noarch",
"7Server-RH7-RHOS-13.0:openstack-neutron-rpc-server-1:12.0.3-5.el7ost.noarch",
"7Server-RH7-RHOS-13.0:openstack-neutron-sriov-nic-agent-1:12.0.3-5.el7ost.noarch",
"7Server-RH7-RHOS-13.0:python-neutron-1:12.0.3-5.el7ost.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-14635"
},
{
"category": "external",
"summary": "RHBZ#1607822",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1607822"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-14635",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14635"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14635",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14635"
}
],
"release_date": "2018-03-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-09-17T16:47:18+00:00",
"details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RH7-RHOS-13.0:openstack-neutron-1:12.0.3-5.el7ost.noarch",
"7Server-RH7-RHOS-13.0:openstack-neutron-1:12.0.3-5.el7ost.src",
"7Server-RH7-RHOS-13.0:openstack-neutron-common-1:12.0.3-5.el7ost.noarch",
"7Server-RH7-RHOS-13.0:openstack-neutron-linuxbridge-1:12.0.3-5.el7ost.noarch",
"7Server-RH7-RHOS-13.0:openstack-neutron-macvtap-agent-1:12.0.3-5.el7ost.noarch",
"7Server-RH7-RHOS-13.0:openstack-neutron-metering-agent-1:12.0.3-5.el7ost.noarch",
"7Server-RH7-RHOS-13.0:openstack-neutron-ml2-1:12.0.3-5.el7ost.noarch",
"7Server-RH7-RHOS-13.0:openstack-neutron-openvswitch-1:12.0.3-5.el7ost.noarch",
"7Server-RH7-RHOS-13.0:openstack-neutron-rpc-server-1:12.0.3-5.el7ost.noarch",
"7Server-RH7-RHOS-13.0:openstack-neutron-sriov-nic-agent-1:12.0.3-5.el7ost.noarch",
"7Server-RH7-RHOS-13.0:python-neutron-1:12.0.3-5.el7ost.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2710"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-RH7-RHOS-13.0:openstack-neutron-1:12.0.3-5.el7ost.noarch",
"7Server-RH7-RHOS-13.0:openstack-neutron-1:12.0.3-5.el7ost.src",
"7Server-RH7-RHOS-13.0:openstack-neutron-common-1:12.0.3-5.el7ost.noarch",
"7Server-RH7-RHOS-13.0:openstack-neutron-linuxbridge-1:12.0.3-5.el7ost.noarch",
"7Server-RH7-RHOS-13.0:openstack-neutron-macvtap-agent-1:12.0.3-5.el7ost.noarch",
"7Server-RH7-RHOS-13.0:openstack-neutron-metering-agent-1:12.0.3-5.el7ost.noarch",
"7Server-RH7-RHOS-13.0:openstack-neutron-ml2-1:12.0.3-5.el7ost.noarch",
"7Server-RH7-RHOS-13.0:openstack-neutron-openvswitch-1:12.0.3-5.el7ost.noarch",
"7Server-RH7-RHOS-13.0:openstack-neutron-rpc-server-1:12.0.3-5.el7ost.noarch",
"7Server-RH7-RHOS-13.0:openstack-neutron-sriov-nic-agent-1:12.0.3-5.el7ost.noarch",
"7Server-RH7-RHOS-13.0:python-neutron-1:12.0.3-5.el7ost.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openstack-neutron: A router interface out of subnet IP range results in a denial of service"
}
]
}
RHSA-2018_2715
Vulnerability from csaf_redhat - Published: 2018-09-17 16:52 - Updated: 2024-11-15 00:36Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for openstack-neutron is now available for Red Hat OpenStack Platform 10.0 (Newton).\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OpenStack Networking (neutron) is a pluggable, scalable, and API-driven system that provisions networking services to virtual machines. Its main function is to manage connectivity to and from virtual machines.\n\nSecurity Fix(es):\n\n* openstack-neutron: A router interface out of subnet IP range results in a denial of service (CVE-2018-14635)\n\nFor more details about the security issue, including the impact, a CVSS score, and other related information, refer to the CVE page listed in the References section.\n\nBug Fix(es):\n\n* A new configuration option bridge_mac_table_size has been added for the neutron OVS agent. This value is set on every Open vSwitch bridge managed by the openvswitch-neutron-agent. The value controls the maximum number of MAC addresses that can be learned on a bridge. The default value for this new option is 50,000, which should be enough for most systems. Values outside a reasonable range (10 to 1,000,000) might be overridden by Open vSwitch. (BZ#1589031)\n\n* Previously, when a VM was destroyed, the IPv6 lease was not removed from dnsmasq lease files due to a missing dhcp_release6 binary.\n\nWith this update, the dhcp_release6 binary is now provided in an updated dnsmasq-utils package version. (BZ#1545006)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:2715",
"url": "https://access.redhat.com/errata/RHSA-2018:2715"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1404709",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1404709"
},
{
"category": "external",
"summary": "1511394",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1511394"
},
{
"category": "external",
"summary": "1532280",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1532280"
},
{
"category": "external",
"summary": "1545006",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1545006"
},
{
"category": "external",
"summary": "1561907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561907"
},
{
"category": "external",
"summary": "1570908",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1570908"
},
{
"category": "external",
"summary": "1575356",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1575356"
},
{
"category": "external",
"summary": "1576256",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1576256"
},
{
"category": "external",
"summary": "1578414",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1578414"
},
{
"category": "external",
"summary": "1579400",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1579400"
},
{
"category": "external",
"summary": "1584845",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1584845"
},
{
"category": "external",
"summary": "1589031",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1589031"
},
{
"category": "external",
"summary": "1607822",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1607822"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2715.json"
}
],
"title": "Red Hat Security Advisory: openstack-neutron security and bug fix update",
"tracking": {
"current_release_date": "2024-11-15T00:36:05+00:00",
"generator": {
"date": "2024-11-15T00:36:05+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2018:2715",
"initial_release_date": "2018-09-17T16:52:42+00:00",
"revision_history": [
{
"date": "2018-09-17T16:52:42+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-09-17T16:52:42+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T00:36:05+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenStack Platform 10.0",
"product": {
"name": "Red Hat OpenStack Platform 10.0",
"product_id": "7Server-RH7-RHOS-10.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openstack:10::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenStack Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "openstack-neutron-macvtap-agent-1:9.4.1-28.el7ost.noarch",
"product": {
"name": "openstack-neutron-macvtap-agent-1:9.4.1-28.el7ost.noarch",
"product_id": "openstack-neutron-macvtap-agent-1:9.4.1-28.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-neutron-macvtap-agent@9.4.1-28.el7ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openstack-neutron-ml2-1:9.4.1-28.el7ost.noarch",
"product": {
"name": "openstack-neutron-ml2-1:9.4.1-28.el7ost.noarch",
"product_id": "openstack-neutron-ml2-1:9.4.1-28.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-neutron-ml2@9.4.1-28.el7ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openstack-neutron-sriov-nic-agent-1:9.4.1-28.el7ost.noarch",
"product": {
"name": "openstack-neutron-sriov-nic-agent-1:9.4.1-28.el7ost.noarch",
"product_id": "openstack-neutron-sriov-nic-agent-1:9.4.1-28.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-neutron-sriov-nic-agent@9.4.1-28.el7ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openstack-neutron-rpc-server-1:9.4.1-28.el7ost.noarch",
"product": {
"name": "openstack-neutron-rpc-server-1:9.4.1-28.el7ost.noarch",
"product_id": "openstack-neutron-rpc-server-1:9.4.1-28.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-neutron-rpc-server@9.4.1-28.el7ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "python-neutron-tests-1:9.4.1-28.el7ost.noarch",
"product": {
"name": "python-neutron-tests-1:9.4.1-28.el7ost.noarch",
"product_id": "python-neutron-tests-1:9.4.1-28.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-neutron-tests@9.4.1-28.el7ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "python-neutron-1:9.4.1-28.el7ost.noarch",
"product": {
"name": "python-neutron-1:9.4.1-28.el7ost.noarch",
"product_id": "python-neutron-1:9.4.1-28.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-neutron@9.4.1-28.el7ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openstack-neutron-metering-agent-1:9.4.1-28.el7ost.noarch",
"product": {
"name": "openstack-neutron-metering-agent-1:9.4.1-28.el7ost.noarch",
"product_id": "openstack-neutron-metering-agent-1:9.4.1-28.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-neutron-metering-agent@9.4.1-28.el7ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openstack-neutron-1:9.4.1-28.el7ost.noarch",
"product": {
"name": "openstack-neutron-1:9.4.1-28.el7ost.noarch",
"product_id": "openstack-neutron-1:9.4.1-28.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-neutron@9.4.1-28.el7ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openstack-neutron-common-1:9.4.1-28.el7ost.noarch",
"product": {
"name": "openstack-neutron-common-1:9.4.1-28.el7ost.noarch",
"product_id": "openstack-neutron-common-1:9.4.1-28.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-neutron-common@9.4.1-28.el7ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openstack-neutron-linuxbridge-1:9.4.1-28.el7ost.noarch",
"product": {
"name": "openstack-neutron-linuxbridge-1:9.4.1-28.el7ost.noarch",
"product_id": "openstack-neutron-linuxbridge-1:9.4.1-28.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-neutron-linuxbridge@9.4.1-28.el7ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openstack-neutron-openvswitch-1:9.4.1-28.el7ost.noarch",
"product": {
"name": "openstack-neutron-openvswitch-1:9.4.1-28.el7ost.noarch",
"product_id": "openstack-neutron-openvswitch-1:9.4.1-28.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-neutron-openvswitch@9.4.1-28.el7ost?arch=noarch\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "openstack-neutron-1:9.4.1-28.el7ost.src",
"product": {
"name": "openstack-neutron-1:9.4.1-28.el7ost.src",
"product_id": "openstack-neutron-1:9.4.1-28.el7ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-neutron@9.4.1-28.el7ost?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-neutron-1:9.4.1-28.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0",
"product_id": "7Server-RH7-RHOS-10.0:openstack-neutron-1:9.4.1-28.el7ost.noarch"
},
"product_reference": "openstack-neutron-1:9.4.1-28.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-10.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-neutron-1:9.4.1-28.el7ost.src as a component of Red Hat OpenStack Platform 10.0",
"product_id": "7Server-RH7-RHOS-10.0:openstack-neutron-1:9.4.1-28.el7ost.src"
},
"product_reference": "openstack-neutron-1:9.4.1-28.el7ost.src",
"relates_to_product_reference": "7Server-RH7-RHOS-10.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-neutron-common-1:9.4.1-28.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0",
"product_id": "7Server-RH7-RHOS-10.0:openstack-neutron-common-1:9.4.1-28.el7ost.noarch"
},
"product_reference": "openstack-neutron-common-1:9.4.1-28.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-10.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-neutron-linuxbridge-1:9.4.1-28.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0",
"product_id": "7Server-RH7-RHOS-10.0:openstack-neutron-linuxbridge-1:9.4.1-28.el7ost.noarch"
},
"product_reference": "openstack-neutron-linuxbridge-1:9.4.1-28.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-10.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-neutron-macvtap-agent-1:9.4.1-28.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0",
"product_id": "7Server-RH7-RHOS-10.0:openstack-neutron-macvtap-agent-1:9.4.1-28.el7ost.noarch"
},
"product_reference": "openstack-neutron-macvtap-agent-1:9.4.1-28.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-10.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-neutron-metering-agent-1:9.4.1-28.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0",
"product_id": "7Server-RH7-RHOS-10.0:openstack-neutron-metering-agent-1:9.4.1-28.el7ost.noarch"
},
"product_reference": "openstack-neutron-metering-agent-1:9.4.1-28.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-10.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-neutron-ml2-1:9.4.1-28.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0",
"product_id": "7Server-RH7-RHOS-10.0:openstack-neutron-ml2-1:9.4.1-28.el7ost.noarch"
},
"product_reference": "openstack-neutron-ml2-1:9.4.1-28.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-10.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-neutron-openvswitch-1:9.4.1-28.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0",
"product_id": "7Server-RH7-RHOS-10.0:openstack-neutron-openvswitch-1:9.4.1-28.el7ost.noarch"
},
"product_reference": "openstack-neutron-openvswitch-1:9.4.1-28.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-10.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-neutron-rpc-server-1:9.4.1-28.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0",
"product_id": "7Server-RH7-RHOS-10.0:openstack-neutron-rpc-server-1:9.4.1-28.el7ost.noarch"
},
"product_reference": "openstack-neutron-rpc-server-1:9.4.1-28.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-10.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-neutron-sriov-nic-agent-1:9.4.1-28.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0",
"product_id": "7Server-RH7-RHOS-10.0:openstack-neutron-sriov-nic-agent-1:9.4.1-28.el7ost.noarch"
},
"product_reference": "openstack-neutron-sriov-nic-agent-1:9.4.1-28.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-10.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-neutron-1:9.4.1-28.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0",
"product_id": "7Server-RH7-RHOS-10.0:python-neutron-1:9.4.1-28.el7ost.noarch"
},
"product_reference": "python-neutron-1:9.4.1-28.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-10.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-neutron-tests-1:9.4.1-28.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0",
"product_id": "7Server-RH7-RHOS-10.0:python-neutron-tests-1:9.4.1-28.el7ost.noarch"
},
"product_reference": "python-neutron-tests-1:9.4.1-28.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-10.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-14635",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2018-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1607822"
}
],
"notes": [
{
"category": "description",
"text": "When using the Linux bridge ml2 driver, non-privileged tenants are able to create and attach ports without specifying an IP address, bypassing IP address validation. A potential denial of service could occur if an IP address, conflicting with existing guests or routers, is then assigned from outside of the allowed allocation pool.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openstack-neutron: A router interface out of subnet IP range results in a denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOS-10.0:openstack-neutron-1:9.4.1-28.el7ost.noarch",
"7Server-RH7-RHOS-10.0:openstack-neutron-1:9.4.1-28.el7ost.src",
"7Server-RH7-RHOS-10.0:openstack-neutron-common-1:9.4.1-28.el7ost.noarch",
"7Server-RH7-RHOS-10.0:openstack-neutron-linuxbridge-1:9.4.1-28.el7ost.noarch",
"7Server-RH7-RHOS-10.0:openstack-neutron-macvtap-agent-1:9.4.1-28.el7ost.noarch",
"7Server-RH7-RHOS-10.0:openstack-neutron-metering-agent-1:9.4.1-28.el7ost.noarch",
"7Server-RH7-RHOS-10.0:openstack-neutron-ml2-1:9.4.1-28.el7ost.noarch",
"7Server-RH7-RHOS-10.0:openstack-neutron-openvswitch-1:9.4.1-28.el7ost.noarch",
"7Server-RH7-RHOS-10.0:openstack-neutron-rpc-server-1:9.4.1-28.el7ost.noarch",
"7Server-RH7-RHOS-10.0:openstack-neutron-sriov-nic-agent-1:9.4.1-28.el7ost.noarch",
"7Server-RH7-RHOS-10.0:python-neutron-1:9.4.1-28.el7ost.noarch",
"7Server-RH7-RHOS-10.0:python-neutron-tests-1:9.4.1-28.el7ost.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-14635"
},
{
"category": "external",
"summary": "RHBZ#1607822",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1607822"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-14635",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14635"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14635",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14635"
}
],
"release_date": "2018-03-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-09-17T16:52:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RH7-RHOS-10.0:openstack-neutron-1:9.4.1-28.el7ost.noarch",
"7Server-RH7-RHOS-10.0:openstack-neutron-1:9.4.1-28.el7ost.src",
"7Server-RH7-RHOS-10.0:openstack-neutron-common-1:9.4.1-28.el7ost.noarch",
"7Server-RH7-RHOS-10.0:openstack-neutron-linuxbridge-1:9.4.1-28.el7ost.noarch",
"7Server-RH7-RHOS-10.0:openstack-neutron-macvtap-agent-1:9.4.1-28.el7ost.noarch",
"7Server-RH7-RHOS-10.0:openstack-neutron-metering-agent-1:9.4.1-28.el7ost.noarch",
"7Server-RH7-RHOS-10.0:openstack-neutron-ml2-1:9.4.1-28.el7ost.noarch",
"7Server-RH7-RHOS-10.0:openstack-neutron-openvswitch-1:9.4.1-28.el7ost.noarch",
"7Server-RH7-RHOS-10.0:openstack-neutron-rpc-server-1:9.4.1-28.el7ost.noarch",
"7Server-RH7-RHOS-10.0:openstack-neutron-sriov-nic-agent-1:9.4.1-28.el7ost.noarch",
"7Server-RH7-RHOS-10.0:python-neutron-1:9.4.1-28.el7ost.noarch",
"7Server-RH7-RHOS-10.0:python-neutron-tests-1:9.4.1-28.el7ost.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:2715"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-RH7-RHOS-10.0:openstack-neutron-1:9.4.1-28.el7ost.noarch",
"7Server-RH7-RHOS-10.0:openstack-neutron-1:9.4.1-28.el7ost.src",
"7Server-RH7-RHOS-10.0:openstack-neutron-common-1:9.4.1-28.el7ost.noarch",
"7Server-RH7-RHOS-10.0:openstack-neutron-linuxbridge-1:9.4.1-28.el7ost.noarch",
"7Server-RH7-RHOS-10.0:openstack-neutron-macvtap-agent-1:9.4.1-28.el7ost.noarch",
"7Server-RH7-RHOS-10.0:openstack-neutron-metering-agent-1:9.4.1-28.el7ost.noarch",
"7Server-RH7-RHOS-10.0:openstack-neutron-ml2-1:9.4.1-28.el7ost.noarch",
"7Server-RH7-RHOS-10.0:openstack-neutron-openvswitch-1:9.4.1-28.el7ost.noarch",
"7Server-RH7-RHOS-10.0:openstack-neutron-rpc-server-1:9.4.1-28.el7ost.noarch",
"7Server-RH7-RHOS-10.0:openstack-neutron-sriov-nic-agent-1:9.4.1-28.el7ost.noarch",
"7Server-RH7-RHOS-10.0:python-neutron-1:9.4.1-28.el7ost.noarch",
"7Server-RH7-RHOS-10.0:python-neutron-tests-1:9.4.1-28.el7ost.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openstack-neutron: A router interface out of subnet IP range results in a denial of service"
}
]
}
RHSA-2018_3792
Vulnerability from csaf_redhat - Published: 2018-12-05 18:51 - Updated: 2024-11-15 00:38Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for openstack-neutron is now available for Red Hat OpenStack Platform 12.0 (Pike).\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OpenStack Networking (neutron) is a pluggable, scalable, and API-driven system that provisions networking services to virtual machines. Its main function is to manage connectivity to and from virtual machines.\n\nSecurity Fix(es):\n\n* openstack-neutron: A router interface out of subnet IP range results in a denial of service (CVE-2018-14635)\n\nFor more details about the security issues, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE pages listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:3792",
"url": "https://access.redhat.com/errata/RHSA-2018:3792"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1530131",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1530131"
},
{
"category": "external",
"summary": "1539638",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1539638"
},
{
"category": "external",
"summary": "1607822",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1607822"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_3792.json"
}
],
"title": "Red Hat Security Advisory: openstack-neutron security update",
"tracking": {
"current_release_date": "2024-11-15T00:38:30+00:00",
"generator": {
"date": "2024-11-15T00:38:30+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2018:3792",
"initial_release_date": "2018-12-05T18:51:51+00:00",
"revision_history": [
{
"date": "2018-12-05T18:51:51+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-12-05T18:51:51+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T00:38:30+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenStack Platform 12.0",
"product": {
"name": "Red Hat OpenStack Platform 12.0",
"product_id": "7Server-RH7-RHOS-12.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openstack:12::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenStack Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "openstack-neutron-sriov-nic-agent-1:11.0.4-6.el7ost.noarch",
"product": {
"name": "openstack-neutron-sriov-nic-agent-1:11.0.4-6.el7ost.noarch",
"product_id": "openstack-neutron-sriov-nic-agent-1:11.0.4-6.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-neutron-sriov-nic-agent@11.0.4-6.el7ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "python-neutron-1:11.0.4-6.el7ost.noarch",
"product": {
"name": "python-neutron-1:11.0.4-6.el7ost.noarch",
"product_id": "python-neutron-1:11.0.4-6.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-neutron@11.0.4-6.el7ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openstack-neutron-metering-agent-1:11.0.4-6.el7ost.noarch",
"product": {
"name": "openstack-neutron-metering-agent-1:11.0.4-6.el7ost.noarch",
"product_id": "openstack-neutron-metering-agent-1:11.0.4-6.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-neutron-metering-agent@11.0.4-6.el7ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "python-neutron-tests-1:11.0.4-6.el7ost.noarch",
"product": {
"name": "python-neutron-tests-1:11.0.4-6.el7ost.noarch",
"product_id": "python-neutron-tests-1:11.0.4-6.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-neutron-tests@11.0.4-6.el7ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openstack-neutron-openvswitch-1:11.0.4-6.el7ost.noarch",
"product": {
"name": "openstack-neutron-openvswitch-1:11.0.4-6.el7ost.noarch",
"product_id": "openstack-neutron-openvswitch-1:11.0.4-6.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-neutron-openvswitch@11.0.4-6.el7ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openstack-neutron-rpc-server-1:11.0.4-6.el7ost.noarch",
"product": {
"name": "openstack-neutron-rpc-server-1:11.0.4-6.el7ost.noarch",
"product_id": "openstack-neutron-rpc-server-1:11.0.4-6.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-neutron-rpc-server@11.0.4-6.el7ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openstack-neutron-ml2-1:11.0.4-6.el7ost.noarch",
"product": {
"name": "openstack-neutron-ml2-1:11.0.4-6.el7ost.noarch",
"product_id": "openstack-neutron-ml2-1:11.0.4-6.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-neutron-ml2@11.0.4-6.el7ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openstack-neutron-macvtap-agent-1:11.0.4-6.el7ost.noarch",
"product": {
"name": "openstack-neutron-macvtap-agent-1:11.0.4-6.el7ost.noarch",
"product_id": "openstack-neutron-macvtap-agent-1:11.0.4-6.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-neutron-macvtap-agent@11.0.4-6.el7ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openstack-neutron-1:11.0.4-6.el7ost.noarch",
"product": {
"name": "openstack-neutron-1:11.0.4-6.el7ost.noarch",
"product_id": "openstack-neutron-1:11.0.4-6.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-neutron@11.0.4-6.el7ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openstack-neutron-common-1:11.0.4-6.el7ost.noarch",
"product": {
"name": "openstack-neutron-common-1:11.0.4-6.el7ost.noarch",
"product_id": "openstack-neutron-common-1:11.0.4-6.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-neutron-common@11.0.4-6.el7ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openstack-neutron-linuxbridge-1:11.0.4-6.el7ost.noarch",
"product": {
"name": "openstack-neutron-linuxbridge-1:11.0.4-6.el7ost.noarch",
"product_id": "openstack-neutron-linuxbridge-1:11.0.4-6.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-neutron-linuxbridge@11.0.4-6.el7ost?arch=noarch\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "openstack-neutron-1:11.0.4-6.el7ost.src",
"product": {
"name": "openstack-neutron-1:11.0.4-6.el7ost.src",
"product_id": "openstack-neutron-1:11.0.4-6.el7ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-neutron@11.0.4-6.el7ost?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-neutron-1:11.0.4-6.el7ost.noarch as a component of Red Hat OpenStack Platform 12.0",
"product_id": "7Server-RH7-RHOS-12.0:openstack-neutron-1:11.0.4-6.el7ost.noarch"
},
"product_reference": "openstack-neutron-1:11.0.4-6.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-12.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-neutron-1:11.0.4-6.el7ost.src as a component of Red Hat OpenStack Platform 12.0",
"product_id": "7Server-RH7-RHOS-12.0:openstack-neutron-1:11.0.4-6.el7ost.src"
},
"product_reference": "openstack-neutron-1:11.0.4-6.el7ost.src",
"relates_to_product_reference": "7Server-RH7-RHOS-12.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-neutron-common-1:11.0.4-6.el7ost.noarch as a component of Red Hat OpenStack Platform 12.0",
"product_id": "7Server-RH7-RHOS-12.0:openstack-neutron-common-1:11.0.4-6.el7ost.noarch"
},
"product_reference": "openstack-neutron-common-1:11.0.4-6.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-12.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-neutron-linuxbridge-1:11.0.4-6.el7ost.noarch as a component of Red Hat OpenStack Platform 12.0",
"product_id": "7Server-RH7-RHOS-12.0:openstack-neutron-linuxbridge-1:11.0.4-6.el7ost.noarch"
},
"product_reference": "openstack-neutron-linuxbridge-1:11.0.4-6.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-12.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-neutron-macvtap-agent-1:11.0.4-6.el7ost.noarch as a component of Red Hat OpenStack Platform 12.0",
"product_id": "7Server-RH7-RHOS-12.0:openstack-neutron-macvtap-agent-1:11.0.4-6.el7ost.noarch"
},
"product_reference": "openstack-neutron-macvtap-agent-1:11.0.4-6.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-12.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-neutron-metering-agent-1:11.0.4-6.el7ost.noarch as a component of Red Hat OpenStack Platform 12.0",
"product_id": "7Server-RH7-RHOS-12.0:openstack-neutron-metering-agent-1:11.0.4-6.el7ost.noarch"
},
"product_reference": "openstack-neutron-metering-agent-1:11.0.4-6.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-12.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-neutron-ml2-1:11.0.4-6.el7ost.noarch as a component of Red Hat OpenStack Platform 12.0",
"product_id": "7Server-RH7-RHOS-12.0:openstack-neutron-ml2-1:11.0.4-6.el7ost.noarch"
},
"product_reference": "openstack-neutron-ml2-1:11.0.4-6.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-12.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-neutron-openvswitch-1:11.0.4-6.el7ost.noarch as a component of Red Hat OpenStack Platform 12.0",
"product_id": "7Server-RH7-RHOS-12.0:openstack-neutron-openvswitch-1:11.0.4-6.el7ost.noarch"
},
"product_reference": "openstack-neutron-openvswitch-1:11.0.4-6.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-12.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-neutron-rpc-server-1:11.0.4-6.el7ost.noarch as a component of Red Hat OpenStack Platform 12.0",
"product_id": "7Server-RH7-RHOS-12.0:openstack-neutron-rpc-server-1:11.0.4-6.el7ost.noarch"
},
"product_reference": "openstack-neutron-rpc-server-1:11.0.4-6.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-12.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-neutron-sriov-nic-agent-1:11.0.4-6.el7ost.noarch as a component of Red Hat OpenStack Platform 12.0",
"product_id": "7Server-RH7-RHOS-12.0:openstack-neutron-sriov-nic-agent-1:11.0.4-6.el7ost.noarch"
},
"product_reference": "openstack-neutron-sriov-nic-agent-1:11.0.4-6.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-12.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-neutron-1:11.0.4-6.el7ost.noarch as a component of Red Hat OpenStack Platform 12.0",
"product_id": "7Server-RH7-RHOS-12.0:python-neutron-1:11.0.4-6.el7ost.noarch"
},
"product_reference": "python-neutron-1:11.0.4-6.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-12.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-neutron-tests-1:11.0.4-6.el7ost.noarch as a component of Red Hat OpenStack Platform 12.0",
"product_id": "7Server-RH7-RHOS-12.0:python-neutron-tests-1:11.0.4-6.el7ost.noarch"
},
"product_reference": "python-neutron-tests-1:11.0.4-6.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-12.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-14635",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2018-07-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1607822"
}
],
"notes": [
{
"category": "description",
"text": "When using the Linux bridge ml2 driver, non-privileged tenants are able to create and attach ports without specifying an IP address, bypassing IP address validation. A potential denial of service could occur if an IP address, conflicting with existing guests or routers, is then assigned from outside of the allowed allocation pool.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openstack-neutron: A router interface out of subnet IP range results in a denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOS-12.0:openstack-neutron-1:11.0.4-6.el7ost.noarch",
"7Server-RH7-RHOS-12.0:openstack-neutron-1:11.0.4-6.el7ost.src",
"7Server-RH7-RHOS-12.0:openstack-neutron-common-1:11.0.4-6.el7ost.noarch",
"7Server-RH7-RHOS-12.0:openstack-neutron-linuxbridge-1:11.0.4-6.el7ost.noarch",
"7Server-RH7-RHOS-12.0:openstack-neutron-macvtap-agent-1:11.0.4-6.el7ost.noarch",
"7Server-RH7-RHOS-12.0:openstack-neutron-metering-agent-1:11.0.4-6.el7ost.noarch",
"7Server-RH7-RHOS-12.0:openstack-neutron-ml2-1:11.0.4-6.el7ost.noarch",
"7Server-RH7-RHOS-12.0:openstack-neutron-openvswitch-1:11.0.4-6.el7ost.noarch",
"7Server-RH7-RHOS-12.0:openstack-neutron-rpc-server-1:11.0.4-6.el7ost.noarch",
"7Server-RH7-RHOS-12.0:openstack-neutron-sriov-nic-agent-1:11.0.4-6.el7ost.noarch",
"7Server-RH7-RHOS-12.0:python-neutron-1:11.0.4-6.el7ost.noarch",
"7Server-RH7-RHOS-12.0:python-neutron-tests-1:11.0.4-6.el7ost.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-14635"
},
{
"category": "external",
"summary": "RHBZ#1607822",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1607822"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-14635",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14635"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14635",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14635"
}
],
"release_date": "2018-03-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-12-05T18:51:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RH7-RHOS-12.0:openstack-neutron-1:11.0.4-6.el7ost.noarch",
"7Server-RH7-RHOS-12.0:openstack-neutron-1:11.0.4-6.el7ost.src",
"7Server-RH7-RHOS-12.0:openstack-neutron-common-1:11.0.4-6.el7ost.noarch",
"7Server-RH7-RHOS-12.0:openstack-neutron-linuxbridge-1:11.0.4-6.el7ost.noarch",
"7Server-RH7-RHOS-12.0:openstack-neutron-macvtap-agent-1:11.0.4-6.el7ost.noarch",
"7Server-RH7-RHOS-12.0:openstack-neutron-metering-agent-1:11.0.4-6.el7ost.noarch",
"7Server-RH7-RHOS-12.0:openstack-neutron-ml2-1:11.0.4-6.el7ost.noarch",
"7Server-RH7-RHOS-12.0:openstack-neutron-openvswitch-1:11.0.4-6.el7ost.noarch",
"7Server-RH7-RHOS-12.0:openstack-neutron-rpc-server-1:11.0.4-6.el7ost.noarch",
"7Server-RH7-RHOS-12.0:openstack-neutron-sriov-nic-agent-1:11.0.4-6.el7ost.noarch",
"7Server-RH7-RHOS-12.0:python-neutron-1:11.0.4-6.el7ost.noarch",
"7Server-RH7-RHOS-12.0:python-neutron-tests-1:11.0.4-6.el7ost.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:3792"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-RH7-RHOS-12.0:openstack-neutron-1:11.0.4-6.el7ost.noarch",
"7Server-RH7-RHOS-12.0:openstack-neutron-1:11.0.4-6.el7ost.src",
"7Server-RH7-RHOS-12.0:openstack-neutron-common-1:11.0.4-6.el7ost.noarch",
"7Server-RH7-RHOS-12.0:openstack-neutron-linuxbridge-1:11.0.4-6.el7ost.noarch",
"7Server-RH7-RHOS-12.0:openstack-neutron-macvtap-agent-1:11.0.4-6.el7ost.noarch",
"7Server-RH7-RHOS-12.0:openstack-neutron-metering-agent-1:11.0.4-6.el7ost.noarch",
"7Server-RH7-RHOS-12.0:openstack-neutron-ml2-1:11.0.4-6.el7ost.noarch",
"7Server-RH7-RHOS-12.0:openstack-neutron-openvswitch-1:11.0.4-6.el7ost.noarch",
"7Server-RH7-RHOS-12.0:openstack-neutron-rpc-server-1:11.0.4-6.el7ost.noarch",
"7Server-RH7-RHOS-12.0:openstack-neutron-sriov-nic-agent-1:11.0.4-6.el7ost.noarch",
"7Server-RH7-RHOS-12.0:python-neutron-1:11.0.4-6.el7ost.noarch",
"7Server-RH7-RHOS-12.0:python-neutron-tests-1:11.0.4-6.el7ost.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openstack-neutron: A router interface out of subnet IP range results in a denial of service"
}
]
}
GHSA-X634-34M9-96MP
Vulnerability from github – Published: 2022-05-13 01:07 – Updated: 2024-09-25 20:45When using the Linux bridge ml2 driver, non-privileged tenants are able to create and attach ports without specifying an IP address, bypassing IP address validation. A potential denial of service could occur if an IP address, conflicting with existing guests or routers, is then assigned from outside of the allowed allocation pool. Versions of openstack-neutron before 13.0.0.0b2, 12.0.3 and 11.0.5 are vulnerable.
{
"affected": [
{
"package": {
"ecosystem": "PyPI",
"name": "neutron"
},
"ranges": [
{
"events": [
{
"introduced": "13.0.0.0b1"
},
{
"fixed": "13.0.0.0b2"
}
],
"type": "ECOSYSTEM"
}
],
"versions": [
"13.0.0.0b1"
]
},
{
"package": {
"ecosystem": "PyPI",
"name": "neutron"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "11.0.6"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "PyPI",
"name": "neutron"
},
"ranges": [
{
"events": [
{
"introduced": "12.0.0"
},
{
"fixed": "12.0.4"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2018-14635"
],
"database_specific": {
"cwe_ids": [
"CWE-20"
],
"github_reviewed": true,
"github_reviewed_at": "2024-04-08T18:53:04Z",
"nvd_published_at": "2018-09-10T19:29:00Z",
"severity": "HIGH"
},
"details": "When using the Linux bridge ml2 driver, non-privileged tenants are able to create and attach ports without specifying an IP address, bypassing IP address validation. A potential denial of service could occur if an IP address, conflicting with existing guests or routers, is then assigned from outside of the allowed allocation pool. Versions of openstack-neutron before 13.0.0.0b2, 12.0.3 and 11.0.5 are vulnerable.",
"id": "GHSA-x634-34m9-96mp",
"modified": "2024-09-25T20:45:21Z",
"published": "2022-05-13T01:07:33Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14635"
},
{
"type": "WEB",
"url": "https://github.com/openstack/neutron/commit/54aa6e81cb17b33ce4d5d469cc11dec2869c762d"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2018:2710"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2018:2715"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2018:2721"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2018:3792"
},
{
"type": "WEB",
"url": "https://bugs.launchpad.net/neutron/+bug/1757482"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14635"
},
{
"type": "WEB",
"url": "https://git.openstack.org/cgit/openstack/neutron/commit/?id=54aa6e81cb17b33ce4d5d469cc11dec2869c762d"
},
{
"type": "PACKAGE",
"url": "https://github.com/openstack/neutron"
},
{
"type": "WEB",
"url": "https://github.com/pypa/advisory-database/tree/main/vulns/neutron/PYSEC-2018-93.yaml"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"type": "CVSS_V4"
}
],
"summary": "OpensStack Neutron Denial of Service Vulnerability"
}
PYSEC-2018-93
Vulnerability from pysec - Published: 2018-09-10 19:29 - Updated: 2021-08-27 03:22When using the Linux bridge ml2 driver, non-privileged tenants are able to create and attach ports without specifying an IP address, bypassing IP address validation. A potential denial of service could occur if an IP address, conflicting with existing guests or routers, is then assigned from outside of the allowed allocation pool. Versions of openstack-neutron before 13.0.0.0b2, 12.0.3 and 11.0.5 are vulnerable.
| Name | purl | neutron | pkg:pypi/neutron |
|---|
{
"affected": [
{
"package": {
"ecosystem": "PyPI",
"name": "neutron",
"purl": "pkg:pypi/neutron"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "11.0.6"
},
{
"introduced": "12.0.0"
},
{
"fixed": "12.0.4"
}
],
"type": "ECOSYSTEM"
}
],
"versions": [
"0.0",
"10.0.5",
"10.0.6",
"10.0.7",
"11.0.3",
"11.0.4",
"11.0.5",
"12.0.0",
"12.0.1",
"12.0.2",
"12.0.3"
]
}
],
"aliases": [
"CVE-2018-14635"
],
"details": "When using the Linux bridge ml2 driver, non-privileged tenants are able to create and attach ports without specifying an IP address, bypassing IP address validation. A potential denial of service could occur if an IP address, conflicting with existing guests or routers, is then assigned from outside of the allowed allocation pool. Versions of openstack-neutron before 13.0.0.0b2, 12.0.3 and 11.0.5 are vulnerable.",
"id": "PYSEC-2018-93",
"modified": "2021-08-27T03:22:08.555558Z",
"published": "2018-09-10T19:29:00Z",
"references": [
{
"type": "WEB",
"url": "https://git.openstack.org/cgit/openstack/neutron/commit/?id=54aa6e81cb17b33ce4d5d469cc11dec2869c762d"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14635"
},
{
"type": "WEB",
"url": "https://bugs.launchpad.net/neutron/+bug/1757482"
},
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2018:2715"
},
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2018:2710"
},
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2018:2721"
},
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2018:3792"
}
]
}
GSD-2018-14635
Vulnerability from gsd - Updated: 2023-12-13 01:22{
"GSD": {
"alias": "CVE-2018-14635",
"description": "When using the Linux bridge ml2 driver, non-privileged tenants are able to create and attach ports without specifying an IP address, bypassing IP address validation. A potential denial of service could occur if an IP address, conflicting with existing guests or routers, is then assigned from outside of the allowed allocation pool. Versions of openstack-neutron before 13.0.0.0b2, 12.0.3 and 11.0.5 are vulnerable.",
"id": "GSD-2018-14635",
"references": [
"https://www.suse.com/security/cve/CVE-2018-14635.html",
"https://access.redhat.com/errata/RHSA-2018:3792",
"https://access.redhat.com/errata/RHSA-2018:2715",
"https://access.redhat.com/errata/RHSA-2018:2710"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2018-14635"
],
"details": "When using the Linux bridge ml2 driver, non-privileged tenants are able to create and attach ports without specifying an IP address, bypassing IP address validation. A potential denial of service could occur if an IP address, conflicting with existing guests or routers, is then assigned from outside of the allowed allocation pool. Versions of openstack-neutron before 13.0.0.0b2, 12.0.3 and 11.0.5 are vulnerable.",
"id": "GSD-2018-14635",
"modified": "2023-12-13T01:22:38.485171Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2018-14635",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "openstack-neutron",
"version": {
"version_data": [
{
"version_value": "13.0.0.0b2, 12.0.3, 11.0.5"
}
]
}
}
]
},
"vendor_name": "The Openstack Project"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "When using the Linux bridge ml2 driver, non-privileged tenants are able to create and attach ports without specifying an IP address, bypassing IP address validation. A potential denial of service could occur if an IP address, conflicting with existing guests or routers, is then assigned from outside of the allowed allocation pool. Versions of openstack-neutron before 13.0.0.0b2, 12.0.3 and 11.0.5 are vulnerable."
}
]
},
"impact": {
"cvss": [
[
{
"vectorString": "6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
]
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-20"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "RHSA-2018:2710",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2710"
},
{
"name": "RHSA-2018:2715",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2715"
},
{
"name": "https://bugs.launchpad.net/neutron/+bug/1757482",
"refsource": "CONFIRM",
"url": "https://bugs.launchpad.net/neutron/+bug/1757482"
},
{
"name": "RHSA-2018:2721",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:2721"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14635",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14635"
},
{
"name": "RHSA-2018:3792",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3792"
},
{
"name": "https://git.openstack.org/cgit/openstack/neutron/commit/?id=54aa6e81cb17b33ce4d5d469cc11dec2869c762d",
"refsource": "CONFIRM",
"url": "https://git.openstack.org/cgit/openstack/neutron/commit/?id=54aa6e81cb17b33ce4d5d469cc11dec2869c762d"
}
]
}
},
"gitlab.com": {
"advisories": [
{
"affected_range": "\u003e=11.0.0,\u003c=11.0.5||\u003e=12.0.0,\u003c=12.0.3||==13.0.0.0",
"affected_versions": "All versions starting from 11.0.0 up to 11.0.5, all versions starting from 12.0.0 up to 12.0.3, version 13.0.0.0",
"cvss_v2": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"cvss_v3": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"cwe_ids": [
"CWE-1035",
"CWE-20",
"CWE-937"
],
"date": "2019-10-09",
"description": "When using the Linux bridge `ml2` driver, non-privileged tenants are able to create and attach ports without specifying an IP address, bypassing IP address validation. A potential denial of service could occur if an IP address, conflicting with existing guests or routers, is then assigned from outside the allowed allocation pool.",
"fixed_versions": [
"11.0.6",
"12.0.4",
"13.0.1"
],
"identifier": "CVE-2018-14635",
"identifiers": [
"CVE-2018-14635"
],
"not_impacted": "All versions before 11.0.0, all versions after 11.0.5 before 12.0.0, all versions after 12.0.3 before 13.0.0.0, all versions after 13.0.0.0",
"package_slug": "pypi/neutron",
"pubdate": "2018-09-10",
"solution": "Upgrade to versions 11.0.6, 12.0.4, 13.0.1 or above.",
"title": "Improper Input Validation",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2018-14635",
"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14635",
"https://git.openstack.org/cgit/openstack/neutron/commit/?id=54aa6e81cb17b33ce4d5d469cc11dec2869c762d"
],
"uuid": "16dfec05-6e56-493c-88fa-dbfc938cdf7f"
}
]
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:openstack:13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:openstack:neutron:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "11.0.5",
"versionStartIncluding": "11.0.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:openstack:neutron:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "12.0.3",
"versionStartIncluding": "12.0.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:openstack:neutron:13.0.0.0:b1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2018-14635"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "When using the Linux bridge ml2 driver, non-privileged tenants are able to create and attach ports without specifying an IP address, bypassing IP address validation. A potential denial of service could occur if an IP address, conflicting with existing guests or routers, is then assigned from outside of the allowed allocation pool. Versions of openstack-neutron before 13.0.0.0b2, 12.0.3 and 11.0.5 are vulnerable."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://git.openstack.org/cgit/openstack/neutron/commit/?id=54aa6e81cb17b33ce4d5d469cc11dec2869c762d",
"refsource": "CONFIRM",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://git.openstack.org/cgit/openstack/neutron/commit/?id=54aa6e81cb17b33ce4d5d469cc11dec2869c762d"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14635",
"refsource": "CONFIRM",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14635"
},
{
"name": "https://bugs.launchpad.net/neutron/+bug/1757482",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://bugs.launchpad.net/neutron/+bug/1757482"
},
{
"name": "RHSA-2018:2715",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2715"
},
{
"name": "RHSA-2018:2710",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2710"
},
{
"name": "RHSA-2018:2721",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2721"
},
{
"name": "RHSA-2018:3792",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3792"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
},
"lastModifiedDate": "2021-08-04T17:15Z",
"publishedDate": "2018-09-10T19:29Z"
}
}
}
FKIE_CVE-2018-14635
Vulnerability from fkie_nvd - Published: 2018-09-10 19:29 - Updated: 2024-11-21 03:496.5 (Medium) - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:*",
"matchCriteriaId": "E722FEF7-58A6-47AD-B1D0-DB0B71B0C7AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*",
"matchCriteriaId": "4D4AC996-B340-4A14-86F7-FF83B4D5EC8F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:openstack:13:*:*:*:*:*:*:*",
"matchCriteriaId": "704CFA1A-953E-4105-BFBE-406034B83DED",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openstack:neutron:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E3BB2AF8-29B1-49C4-A15B-FF432B20E4B4",
"versionEndIncluding": "11.0.5",
"versionStartIncluding": "11.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openstack:neutron:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F675D5F4-0FB0-4D0F-A1D7-07F808820868",
"versionEndIncluding": "12.0.3",
"versionStartIncluding": "12.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openstack:neutron:13.0.0.0:b1:*:*:*:*:*:*",
"matchCriteriaId": "DB8CB3DE-98B1-43A6-AFFB-CC469657DFE4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "When using the Linux bridge ml2 driver, non-privileged tenants are able to create and attach ports without specifying an IP address, bypassing IP address validation. A potential denial of service could occur if an IP address, conflicting with existing guests or routers, is then assigned from outside of the allowed allocation pool. Versions of openstack-neutron before 13.0.0.0b2, 12.0.3 and 11.0.5 are vulnerable."
},
{
"lang": "es",
"value": "Al emplear el controlador de Linux bridge ml2, los inquilinos sin privilegios pueden crear y adjuntar puertos sin especificar una direcci\u00f3n IP, omitiendo la validaci\u00f3n de direcciones IP. Podr\u00eda ocurrir una denegaci\u00f3n de servicio (DoS) si una direcci\u00f3n IP, en conflicto con invitados o routers existentes, se asigna desde fuera del grupo de asignaci\u00f3n permitido. Las versiones de openstack-neutron anteriores a la 13.0.0.0b2, 12.0.3 y 11.0.5 son vulnerables."
}
],
"id": "CVE-2018-14635",
"lastModified": "2024-11-21T03:49:28.727",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "secalert@redhat.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2018-09-10T19:29:00.313",
"references": [
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2710"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2715"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2721"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3792"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://bugs.launchpad.net/neutron/+bug/1757482"
},
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14635"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://git.openstack.org/cgit/openstack/neutron/commit/?id=54aa6e81cb17b33ce4d5d469cc11dec2869c762d"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2710"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2715"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:2721"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:3792"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://bugs.launchpad.net/neutron/+bug/1757482"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14635"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://git.openstack.org/cgit/openstack/neutron/commit/?id=54aa6e81cb17b33ce4d5d469cc11dec2869c762d"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "secalert@redhat.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.