CVE-2016-5363: OpenStack Neutron Intended MAC-spoofing protection mechanism bypass
(updated )
The IPTables firewall in OpenStack Neutron up to 7.0.4 and 8.x before 8.1.0 allows remote attackers to bypass an intended MAC-spoofing protection mechanism and consequently cause a denial of service or intercept network traffic via (1) a crafted DHCP discovery message or (2) crafted non-IP traffic.
References
- access.redhat.com/errata/RHSA-2016:1473
- access.redhat.com/errata/RHSA-2016:1474
- bugs.launchpad.net/neutron/+bug/1558658
- github.com/advisories/GHSA-9pp3-cvmq-9p22
- github.com/openstack/neutron
- github.com/openstack/neutron/commit/5853af9cba6733725d6c9ac0db644f426713f0cf
- github.com/openstack/neutron/commit/6a93ee8ac1a901c255e3475a24f1afc11d8bf80f
- github.com/openstack/neutron/commit/997d7b03fb7f5528f0a3ce70867b9dcd9321509e
- github.com/openstack/neutron/commit/fd5fd259a02156babdfcb12f66cde6ec9e7274ae
- nvd.nist.gov/vuln/detail/CVE-2016-5363
- review.openstack.org/
- review.openstack.org/
- review.openstack.org/
- security.openstack.org/ossa/OSSA-2016-009.html
Detect and mitigate CVE-2016-5363 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →