CVE-2015-5240: OpenStack Neutron Race condition vulnerability
(updated )
Race condition in OpenStack Neutron before 2014.2.4 and 2015.1 before 2015.1.2, when using the ML2 plugin or the security groups AMQP API, allows remote authenticated users to bypass IP anti-spoofing controls by changing the device owner of a port to start with network: before the security group rules are applied.
References
- access.redhat.com/errata/RHSA-2015:1909
- access.redhat.com/security/cve/CVE-2015-5240
- bugs.launchpad.net/neutron/+bug/1489111
- bugzilla.redhat.com/show_bug.cgi?id=1258458
- github.com/advisories/GHSA-hhpj-6pj7-wpx5
- github.com/openstack/neutron
- github.com/openstack/neutron/commit/767cea23de44a963c6793ffe30ea5c6827d27a38
- github.com/openstack/neutron/commit/bbca973986fdc99eae9d1b2545e8246c0b2be2e2
- github.com/openstack/neutron/commit/fdc3431ccd219accf6a795079d9b67b8656eed8e
- nvd.nist.gov/vuln/detail/CVE-2015-5240
- security.openstack.org/ossa/OSSA-2015-018.html
Detect and mitigate CVE-2015-5240 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →