Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.12.2023.6067.1
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-6067-1)
Summary:The remote host is missing an update for the 'neutron' package(s) announced via the USN-6067-1 advisory.
Description:Summary:
The remote host is missing an update for the 'neutron' package(s) announced via the USN-6067-1 advisory.

Vulnerability Insight:
David Sinquin discovered that OpenStack Neutron incorrectly handled the
default Open vSwitch firewall rules. An attacker could possibly use this
issue to impersonate the IPv6 addresses of other systems on the network.
This issue only affected Ubuntu 18.04 LTS, and Ubuntu 20.04 LTS.
(CVE-2021-20267)

Jake Yip and Justin Mammarella discovered that OpenStack Neutron
incorrectly handled the linuxbridge driver when ebtables-nft is being
used. An attacker could possibly use this issue to impersonate the hardware
addresss of other systems on the network. This issue only affected Ubuntu
18.04 LTS, and Ubuntu 20.04 LTS. (CVE-2021-38598)

Pavel Toporkov discovered that OpenStack Neutron incorrectly handled
extra_dhcp_opts values. An attacker could possibly use this issue to
reconfigure dnsmasq. This issue only affected Ubuntu 18.04 LTS, and Ubuntu
20.04 LTS. (CVE-2021-40085)

Slawek Kaplonski discovered that OpenStack Neutron incorrectly handled the
routes middleware. An attacker could possibly use this issue to cause the
API worker to consume memory, leading to a denial of service. This issue
only affected Ubuntu 18.04 LTS, and Ubuntu 20.04 LTS. (CVE-2021-40797)

It was discovered that OpenStack Neutron incorrectly handled certain
queries. A remote authenticated user could possibly use this issue to cause
resource consumption, leading to a denial of service. (CVE-2022-3277)

Affected Software/OS:
'neutron' package(s) on Ubuntu 18.04, Ubuntu 20.04, Ubuntu 22.04.

Solution:
Please install the updated package(s).

CVSS Score:
5.8

CVSS Vector:
AV:N/AC:M/Au:N/C:N/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2021-20267
https://bugzilla.redhat.com/show_bug.cgi?id=1934330
http://www.openwall.com/lists/oss-security/2021/07/12/2
Common Vulnerability Exposure (CVE) ID: CVE-2021-38598
https://launchpad.net/bugs/1938670
Common Vulnerability Exposure (CVE) ID: CVE-2021-40085
Debian Security Information: DSA-4983 (Google Search)
https://www.debian.org/security/2021/dsa-4983
https://launchpad.net/bugs/1939733
https://security.openstack.org/ossa/OSSA-2021-005.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00005.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00038.html
http://www.openwall.com/lists/oss-security/2021/08/31/2
Common Vulnerability Exposure (CVE) ID: CVE-2021-40797
https://launchpad.net/bugs/1942179
http://www.openwall.com/lists/oss-security/2021/09/09/2
Common Vulnerability Exposure (CVE) ID: CVE-2022-3277
https://bugs.launchpad.net/neutron/+bug/1988026
https://bugzilla.redhat.com/show_bug.cgi?id=2129193
CopyrightCopyright (C) 2023 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.