CVE-2019-9735

EUVD-2019-0090
An issue was discovered in the iptables firewall module in OpenStack Neutron before 10.0.8, 11.x before 11.0.7, 12.x before 12.0.6, and 13.x before 13.0.3. By setting a destination port in a security group rule along with a protocol that doesn't support that option (for example, VRRP), an authenticated user may block further application of security group rules for instances from any project/tenant on the compute hosts to which it's applied. (Only deployments using the iptables security group driver are affected.)
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
6.5 MEDIUM
NETWORK
LOW
LOW
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 82%
Affected Products (NVD)
VendorProductVersion
openstackneutron
𝑥
< 10.0.8
openstackneutron
11.0.0 ≤
𝑥
< 11.0.7
openstackneutron
12.0.0 ≤
𝑥
< 12.0.6
openstackneutron
13.0.0 ≤
𝑥
< 13.0.3
debiandebian_linux
9.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
neutron
bookworm
2:21.0.0-7
fixed
bullseye
2:17.2.1-0+deb11u1
fixed
bullseye (security)
2:17.2.1-0+deb11u1
fixed
jessie
not-affected
sid
2:25.0.0-1
fixed
trixie
2:25.0.0-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
neutron
bionic
Fixed 2:12.0.6-0ubuntu1
released
cosmic
Fixed 2:13.0.2-0ubuntu3.4
released
disco
not-affected
trusty
dne
xenial
Fixed 2:8.4.0-0ubuntu7.4
released