DEBIAN-CVE-2022-3277

Source
https://security-tracker.debian.org/tracker/CVE-2022-3277
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2022-3277.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2022-3277
Upstream
Published
2023-03-06T23:15:10Z
Modified
2025-09-25T23:27:31.380659Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

An uncontrolled resource consumption flaw was found in openstack-neutron. This flaw allows a remote authenticated user to query a list of security groups for an invalid project. This issue creates resources that are unconstrained by the user's quota. If a malicious user were to submit a significant number of requests, this could lead to a denial of service.

References

Affected packages

Debian:11 / neutron

Package

Name
neutron
Purl
pkg:deb/debian/neutron?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2:17.*

2:17.1.1-6
2:17.2.1-0+deb11u1

2:18.*

2:18.0.0~rc1-1
2:18.0.0-1
2:18.0.0-2
2:18.0.0-3
2:18.0.0-4
2:18.0.0-5
2:18.0.0-6
2:18.1.0-1
2:18.1.0-2
2:18.1.0-3

2:19.*

2:19.0.0~rc1-1
2:19.0.0~rc1-3
2:19.0.0-1
2:19.1.0-1

2:20.*

2:20.0.0~rc1-1
2:20.0.0~rc1-2
2:20.0.0-1
2:20.0.0-2
2:20.2.0-1

2:21.*

2:21.0.0~rc1-1
2:21.0.0~rc1-2
2:21.0.0~rc1-3
2:21.0.0-1
2:21.0.0-2
2:21.0.0-3
2:21.0.0-4
2:21.0.0-5
2:21.0.0-6
2:21.0.0-7

2:22.*

2:22.0.0~rc1-1
2:22.0.0~rc1-2
2:22.0.0-1
2:22.0.0-2
2:22.0.1-1
2:22.0.1-2

2:23.*

2:23.0.0~b3-1
2:23.0.0~rc1-1
2:23.0.0-1
2:23.0.0-2

2:24.*

2:24.0.0~rc1-1
2:24.0.0-1
2:24.0.0-2
2:24.0.0-3
2:24.0.0-3.1

2:25.*

2:25.0.0~rc1-1
2:25.0.0~rc1-2
2:25.0.0~rc2-1
2:25.0.0-1
2:25.0.0-2
2:25.0.0-3
2:25.0.0-4
2:25.0.0-5
2:25.1.0-1
2:25.1.0-3

2:26.*

2:26.0.0~rc1-1
2:26.0.0~rc1-3
2:26.0.0~rc2-1
2:26.0.0-1
2:26.0.0-2
2:26.0.0-3
2:26.0.0-4
2:26.0.0-5
2:26.0.0-6
2:26.0.0-8
2:26.0.0-9

2:27.*

2:27.0.0~rc1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / neutron

Package

Name
neutron
Purl
pkg:deb/debian/neutron?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2:21.*

2:21.0.0-7

2:22.*

2:22.0.0~rc1-1
2:22.0.0~rc1-2
2:22.0.0-1
2:22.0.0-2
2:22.0.1-1
2:22.0.1-2

2:23.*

2:23.0.0~b3-1
2:23.0.0~rc1-1
2:23.0.0-1
2:23.0.0-2

2:24.*

2:24.0.0~rc1-1
2:24.0.0-1
2:24.0.0-2
2:24.0.0-3
2:24.0.0-3.1

2:25.*

2:25.0.0~rc1-1
2:25.0.0~rc1-2
2:25.0.0~rc2-1
2:25.0.0-1
2:25.0.0-2
2:25.0.0-3
2:25.0.0-4
2:25.0.0-5
2:25.1.0-1
2:25.1.0-3

2:26.*

2:26.0.0~rc1-1
2:26.0.0~rc1-3
2:26.0.0~rc2-1
2:26.0.0-1
2:26.0.0-2
2:26.0.0-3
2:26.0.0-4
2:26.0.0-5
2:26.0.0-6
2:26.0.0-8
2:26.0.0-9

2:27.*

2:27.0.0~rc1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / neutron

Package

Name
neutron
Purl
pkg:deb/debian/neutron?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2:26.*

2:26.0.0-9

2:27.*

2:27.0.0~rc1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / neutron

Package

Name
neutron
Purl
pkg:deb/debian/neutron?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2:26.*

2:26.0.0-9

2:27.*

2:27.0.0~rc1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}