Description
Race condition in OpenStack Neutron before 2014.2.4 and 2015.1 before 2015.1.2, when using the ML2 plugin or the security groups AMQP API, allows remote authenticated users to bypass IP anti-spoofing controls by changing the device owner of a port to start with network: before the security group rules are applied.
Published: 2015-10-27
Score: 3.5 Low
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-4160 Race condition in OpenStack Neutron before 2014.2.4 and 2015.1 before 2015.1.2, when using the ML2 plugin or the security groups AMQP API, allows remote authenticated users to bypass IP anti-spoofing controls by changing the device owner of a port to start with network: before the security group rules are applied.
Github GHSA Github GHSA GHSA-hhpj-6pj7-wpx5 OpenStack Neutron Race condition vulnerability
History

No history.

Subscriptions

Openstack Neutron
Redhat Openstack
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-06T06:41:08.869Z

Reserved: 2015-07-01T00:00:00.000Z

Link: CVE-2015-5240

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2015-10-27T16:59:06.230

Modified: 2025-04-12T10:46:40.837

Link: CVE-2015-5240

cve-icon Redhat

Severity : Moderate

Publid Date: 2015-09-08T00:00:00Z

Links: CVE-2015-5240 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses