CVE-2019-10876
Published: 5 April 2019
An issue was discovered in OpenStack Neutron 11.x before 11.0.7, 12.x before 12.0.6, and 13.x before 13.0.3. By creating two security groups with separate/overlapping port ranges, an authenticated user may prevent Neutron from being able to configure networks on any compute nodes where those security groups are present, because of an Open vSwitch (OVS) firewall KeyError. All Neutron deployments utilizing neutron-openvswitch-agent are affected.
Priority
Status
Package | Release | Status |
---|---|---|
neutron Launchpad, Ubuntu, Debian |
upstream |
Released
(2:13.0.2-15)
|
trusty |
Does not exist
(trusty was not-affected [code not present])
|
|
xenial |
Not vulnerable
(code not present)
|
|
bionic |
Released
(2:12.0.5-0ubuntu3)
|
|
cosmic |
Released
(2:13.0.2-0ubuntu3)
|
|
disco |
Not vulnerable
(2:14.0.0~b1~git2018120609.2e720b158b-0ubuntu2)
|
|
Patches: upstream: https://review.openstack.org/648004 (queens, 12.0.x) upstream: https://review.openstack.org/648003 (rocky, 13.0.x) |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 6.5 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | Low |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | None |
Availability impact | None |
Vector | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |