A flaw was found in openstack-neutron's default Open vSwitch firewall rules. By sending carefully crafted packets, anyone in control of a server instance connected to the virtual switch can impersonate the IPv6 addresses of other systems on the network, resulting in denial of service or in some cases possibly interception of traffic intended for other destinations. Only deployments using the Open vSwitch driver are affected. Source: OpenStack project. Versions before openstack-neutron 15.3.3, openstack-neutron 16.3.1 and openstack-neutron 17.1.1 are affected.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-4983-1 | neutron security update |
EUVD |
EUVD-2021-0142 | A flaw was found in openstack-neutron's default Open vSwitch firewall rules. By sending carefully crafted packets, anyone in control of a server instance connected to the virtual switch can impersonate the IPv6 addresses of other systems on the network, resulting in denial of service or in some cases possibly interception of traffic intended for other destinations. Only deployments using the Open vSwitch driver are affected. Source: OpenStack project. Versions before openstack-neutron 15.3.3, openstack-neutron 16.3.1 and openstack-neutron 17.1.1 are affected. |
Github GHSA |
GHSA-w8hx-f868-pvch | Openstack Neutron has Insufficient Verification of IPv6 addresses |
Ubuntu USN |
USN-6067-1 | OpenStack Neutron vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-03T17:37:23.213Z
Reserved: 2020-12-17T00:00:00
Link: CVE-2021-20267
No data.
Status : Modified
Published: 2021-05-28T19:15:07.483
Modified: 2024-11-21T05:46:14.713
Link: CVE-2021-20267
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Github GHSA
Ubuntu USN