A flaw was found in openstack-neutron's default Open vSwitch firewall rules. By sending carefully crafted packets, anyone in control of a server instance connected to the virtual switch can impersonate the IPv6 addresses of other systems on the network, resulting in denial of service or in some cases possibly interception of traffic intended for other destinations. Only deployments using the Open vSwitch driver are affected. Source: OpenStack project. Versions before openstack-neutron 15.3.3, openstack-neutron 16.3.1 and openstack-neutron 17.1.1 are affected.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1934330 | Issue Tracking Patch Third Party Advisory |
https://security.openstack.org/ossa/OSSA-2021-001.html | Patch Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1934330 | Issue Tracking Patch Third Party Advisory |
https://security.openstack.org/ossa/OSSA-2021-001.html | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 05:46
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1934330 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://security.openstack.org/ossa/OSSA-2021-001.html - Patch, Vendor Advisory |
Information
Published : 2021-05-28 19:15
Updated : 2024-11-21 05:46
NVD link : CVE-2021-20267
Mitre link : CVE-2021-20267
CVE.ORG link : CVE-2021-20267
JSON object : View
Products Affected
openstack
- neutron
redhat
- openstack_platform
CWE
CWE-345
Insufficient Verification of Data Authenticity