CVE Vulnerabilities

CVE-2019-9735

Improper Handling of Exceptional Conditions

Published: Mar 13, 2019 | Modified: Nov 21, 2024
CVSS 3.x
6.5
MEDIUM
Source:
NVD
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
4 MEDIUM
AV:N/AC:L/Au:S/C:N/I:N/A:P
RedHat/V2
RedHat/V3
7.1 IMPORTANT
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

An issue was discovered in the iptables firewall module in OpenStack Neutron before 10.0.8, 11.x before 11.0.7, 12.x before 12.0.6, and 13.x before 13.0.3. By setting a destination port in a security group rule along with a protocol that doesnt support that option (for example, VRRP), an authenticated user may block further application of security group rules for instances from any project/tenant on the compute hosts to which its applied. (Only deployments using the iptables security group driver are affected.)

Weakness

The product does not handle or incorrectly handles an exceptional condition.

Affected Software

NameVendorStart VersionEnd Version
NeutronOpenstack*10.0.8 (excluding)
NeutronOpenstack11.0.0 (including)11.0.7 (excluding)
NeutronOpenstack12.0.0 (including)12.0.6 (excluding)
NeutronOpenstack13.0.0 (including)13.0.3 (excluding)
Red Hat OpenStack Platform 10.0 (Newton)RedHatopenstack-neutron-1:9.4.1-40.el7ost*
Red Hat OpenStack Platform 10.0 (Newton)RedHatopenstack-neutron-lbaas-1:9.2.2-8.el7ost*
Red Hat OpenStack Platform 10.0 (Newton)RedHatpython-networking-bigswitch-2:9.42.14-1.el7ost*
Red Hat OpenStack Platform 13.0 (Queens)RedHatopenstack-neutron-1:12.0.5-11.el7ost*
Red Hat OpenStack Platform 14.0 (Rocky)RedHatopenstack-neutron-1:13.0.3-0.20190313155649.00b63be.el7ost*
NeutronUbuntubionic*
NeutronUbuntucosmic*
NeutronUbuntuesm-infra/bionic*
NeutronUbuntuesm-infra/xenial*
NeutronUbuntutrusty*
NeutronUbuntuupstream*
NeutronUbuntuxenial*

References