CVE-2018-14635

Source
https://cve.org/CVERecord?id=CVE-2018-14635
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-14635.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2018-14635
Aliases
Downstream
Published
2018-09-10T19:29:00.313Z
Modified
2026-04-11T12:07:24.699393Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

When using the Linux bridge ml2 driver, non-privileged tenants are able to create and attach ports without specifying an IP address, bypassing IP address validation. A potential denial of service could occur if an IP address, conflicting with existing guests or routers, is then assigned from outside of the allowed allocation pool. Versions of openstack-neutron before 13.0.0.0b2, 12.0.3 and 11.0.5 are vulnerable.

Database specific
{
    "unresolved_ranges": [
        {
            "extracted_events": [
                {
                    "last_affected": "10"
                }
            ],
            "cpe": "cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:*",
            "source": "CPE_FIELD"
        },
        {
            "extracted_events": [
                {
                    "last_affected": "12"
                }
            ],
            "cpe": "cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*",
            "source": "CPE_FIELD"
        },
        {
            "extracted_events": [
                {
                    "last_affected": "13"
                }
            ],
            "cpe": "cpe:2.3:a:redhat:openstack:13:*:*:*:*:*:*:*",
            "source": "CPE_FIELD"
        }
    ]
}
References

Affected packages

Git / opendev.org/openstack/neutron/

Affected ranges

Type
GIT
Repo
https://opendev.org/openstack/neutron/
Events
Introduced
5212c9c563e9470ce9e6abd76bdef22fa652a9b3
Last affected
e3ff53e3fcf6f12b25788642a281d69cbb3943c1
Introduced
fb3f71806174bc2fae7e421268aeee61be36412d
Last affected
9eef1db160521076d8243f1980e681f0f04ecbc6
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
4d40e6e40e6c02d097c41ee68ec1b885b27e8909
Database specific
{
    "extracted_events": [
        {
            "introduced": "11.0.0"
        },
        {
            "last_affected": "11.0.5"
        },
        {
            "introduced": "12.0.0"
        },
        {
            "last_affected": "12.0.3"
        },
        {
            "introduced": "0"
        },
        {
            "last_affected": "13.0.0.0-b1"
        }
    ],
    "cpe": [
        "cpe:2.3:a:openstack:neutron:*:*:*:*:*:*:*:*",
        "cpe:2.3:a:openstack:neutron:13.0.0.0:b1:*:*:*:*:*:*"
    ],
    "source": "CPE_FIELD"
}

Affected versions

10.*
10.0.0.0b1
10.0.0.0b2
10.0.0.0b3
10.0.0.0rc1
11.*
11.0.0
11.0.0.0b1
11.0.0.0b2
11.0.0.0b3
11.0.0.0rc1
11.0.0.0rc3
11.0.1
11.0.2
11.0.3
11.0.4
11.0.5
12.*
12.0.0
12.0.0.0b1
12.0.0.0b2
12.0.0.0b3
12.0.0.0rc1
12.0.0.0rc2
12.0.1
12.0.2
12.0.3
13.*
13.0.0.0b1
2013.*
2013.1.g3
2013.2.b2
2013.2.rc1
2014.*
2014.1.b1
2014.1.b2
2014.1.b3
2014.1.rc1
2014.2.b1
2014.2.b2
2014.2.b3
2014.2.rc1
2015.*
2015.1.0b1
2015.1.0b2
2015.1.0b3
2015.1.0rc1
7.*
7.0.0.0b1
7.0.0.0b2
7.0.0.0b3
7.0.0a0
8.*
8.0.0.0b1
8.0.0.0b2
8.0.0.0b3
8.0.0.0rc1
9.*
9.0.0.0b1
9.0.0.0b2
9.0.0.0b3
9.0.0.0rc1
Other
essex-1
essex-3
folsom-1
folsom-3
grizzly-1

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-14635.json"