Ubuntu update for neutron



Risk Medium
Patch available YES
Number of vulnerabilities 5
CVE-ID CVE-2021-20267
CVE-2021-38598
CVE-2021-40085
CVE-2021-40797
CVE-2022-3277
CWE-ID CWE-345
CWE-862
CWE-284
CWE-400
Exploitation vector Network
Public exploit N/A
Vulnerable software
Ubuntu
Operating systems & Components / Operating system

python-neutron (Ubuntu package)
Operating systems & Components / Operating system package or component

python3-neutron (Ubuntu package)
Operating systems & Components / Operating system package or component

Vendor Canonical Ltd.

Security Bulletin

This security bulletin contains information about 5 vulnerabilities.

1) Insufficient verification of data authenticity

EUVDB-ID: #VU76079

Risk: Medium

CVSSv4.0: [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2021-20267

CWE-ID: CWE-345 - Insufficient Verification of Data Authenticity

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform MitM attack.

The vulnerability exists due to insufficient verification of data authenticity when processing IPv6 packets in openstack-neutron's default Open vSwitch firewall rules. A remote attacker in control of a server instance connected to the virtual switch can impersonate the IPv6 addresses of other systems on the network and intercept traffic or perform a denial of service (DoS) attack.

Mitigation

Update the affected package neutron to the latest version.

Vulnerable software versions

Ubuntu: 18.04 - 22.04

python-neutron (Ubuntu package): before 2:12.1.1-0ubuntu8.1

python3-neutron (Ubuntu package): before 2:16.4.2-0ubuntu6.2

CPE2.3 External links

http://ubuntu.com/security/notices/USN-6067-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Missing Authorization

EUVDB-ID: #VU57243

Risk: Low

CVSSv4.0: [CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2021-38598

CWE-ID: CWE-862 - Missing Authorization

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform MitM attack.

The vulnerability exists due to missing authorization when the linuxbridge driver with ebtables-nft is used on a Netfilter-based platform. A remote attacker in control of a server instance connected to the virtual switch can send specially crafted packets to impersonate the hardware addresses of other systems on the network.

Mitigation

Update the affected package neutron to the latest version.

Vulnerable software versions

Ubuntu: 18.04 - 22.04

python-neutron (Ubuntu package): before 2:12.1.1-0ubuntu8.1

python3-neutron (Ubuntu package): before 2:16.4.2-0ubuntu6.2

CPE2.3 External links

http://ubuntu.com/security/notices/USN-6067-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Improper access control

EUVDB-ID: #VU57242

Risk: Low

CVSSv4.0: [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2021-40085

CWE-ID: CWE-284 - Improper Access Control

Exploit availability: No

Description

The vulnerability allows a remote user to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions. A remote user can bypass implemented security restrictions and reconfigure dnsmasq via a crafted extra_dhcp_opts value.

Mitigation

Update the affected package neutron to the latest version.

Vulnerable software versions

Ubuntu: 18.04 - 22.04

python-neutron (Ubuntu package): before 2:12.1.1-0ubuntu8.1

python3-neutron (Ubuntu package): before 2:16.4.2-0ubuntu6.2

CPE2.3 External links

http://ubuntu.com/security/notices/USN-6067-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Resource exhaustion

EUVDB-ID: #VU59320

Risk: Medium

CVSSv4.0: [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2021-40797

CWE-ID: CWE-400 - Resource exhaustion

Exploit availability: No

Description

The vulnerability allows a remote user to perform a denial of service (DoS) attack.

The vulnerability exists due to application does not properly control consumption of internal resources when processing API calls to nonexistent controllers. A remote authenticated user can trigger resource exhaustion by sending multiple API calls and perform a denial of service (DoS) attack.

Mitigation

Update the affected package neutron to the latest version.

Vulnerable software versions

Ubuntu: 18.04 - 22.04

python-neutron (Ubuntu package): before 2:12.1.1-0ubuntu8.1

python3-neutron (Ubuntu package): before 2:16.4.2-0ubuntu6.2

CPE2.3 External links

http://ubuntu.com/security/notices/USN-6067-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Resource exhaustion

EUVDB-ID: #VU70048

Risk: Medium

CVSSv4.0: [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2022-3277

CWE-ID: CWE-400 - Resource exhaustion

Exploit availability: No

Description

The vulnerability allows a remote user to perform a denial of service (DoS) attack.

The vulnerability exists due to application does not properly control consumption of internal resources when the user queries a list of security groups for an invalid project. A remote user can trigger resource exhaustion and perform a denial of service (DoS) attack.

Mitigation

Update the affected package neutron to the latest version.

Vulnerable software versions

Ubuntu: 18.04 - 22.04

python-neutron (Ubuntu package): before 2:12.1.1-0ubuntu8.1

python3-neutron (Ubuntu package): before 2:16.4.2-0ubuntu6.2

CPE2.3 External links

http://ubuntu.com/security/notices/USN-6067-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###