CVE-2018-14635
Summary
| CVE | CVE-2018-14635 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2018-09-10 19:29:00 UTC |
| Updated | 2021-08-04 17:15:00 UTC |
| Description | When using the Linux bridge ml2 driver, non-privileged tenants are able to create and attach ports without specifying an IP address, bypassing IP address validation. A potential denial of service could occur if an IP address, conflicting with existing guests or routers, is then assigned from outside of the allowed allocation pool. Versions of openstack-neutron before 13.0.0.0b2, 12.0.3 and 11.0.5 are vulnerable. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| Red Hat Customer Portal |
REDHAT |
access.redhat.com |
Third Party Advisory |
| Red Hat Customer Portal |
REDHAT |
access.redhat.com |
Third Party Advisory |
| 1607822 – (CVE-2018-14635) CVE-2018-14635 openstack-neutron: A router interface out of subnet IP range results in a denial of service |
CONFIRM |
bugzilla.redhat.com |
Issue Tracking, Patch, Third Party Advisory |
| openstack/neutron - OpenStack Networking (Neutron) |
CONFIRM |
git.openstack.org |
Patch, Vendor Advisory |
| Red Hat Customer Portal |
REDHAT |
access.redhat.com |
Third Party Advisory |
| Bug #1757482 “IP address for a router interface allowed outside ...” : Bugs : neutron |
CONFIRM |
bugs.launchpad.net |
Third Party Advisory |
| Red Hat Customer Portal |
REDHAT |
access.redhat.com |
Third Party Advisory |
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 998091 Python (Pip) Security Update for neutron (GHSA-x634-34m9-96mp)