CVE-2018-14635: OpensStack Neutron Denial of Service Vulnerability
(updated )
When using the Linux bridge ml2 driver, non-privileged tenants are able to create and attach ports without specifying an IP address, bypassing IP address validation. A potential denial of service could occur if an IP address, conflicting with existing guests or routers, is then assigned from outside of the allowed allocation pool. Versions of openstack-neutron before 13.0.0.0b2, 12.0.3 and 11.0.5 are vulnerable.
References
- access.redhat.com/errata/RHSA-2018:2710
- access.redhat.com/errata/RHSA-2018:2715
- access.redhat.com/errata/RHSA-2018:2721
- access.redhat.com/errata/RHSA-2018:3792
- bugs.launchpad.net/neutron/+bug/1757482
- bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14635
- git.openstack.org/cgit/openstack/neutron/commit/?id=54aa6e81cb17b33ce4d5d469cc11dec2869c762d
- github.com/advisories/GHSA-x634-34m9-96mp
- github.com/openstack/neutron
- github.com/openstack/neutron/commit/54aa6e81cb17b33ce4d5d469cc11dec2869c762d
- github.com/pypa/advisory-database/tree/main/vulns/neutron/PYSEC-2018-93.yaml
- nvd.nist.gov/vuln/detail/CVE-2018-14635
Detect and mitigate CVE-2018-14635 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →