First published: Wed Mar 13 2019(Updated: )
An issue was discovered in the iptables firewall module in OpenStack Neutron before 10.0.8, 11.x before 11.0.7, 12.x before 12.0.6, and 13.x before 13.0.3. By setting a destination port in a security group rule along with a protocol that doesn't support that option (for example, VRRP), an authenticated user may block further application of security group rules for instances from any project/tenant on the compute hosts to which it's applied. (Only deployments using the iptables security group driver are affected.)
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenStack Neutron | <10.0.8 | |
OpenStack Neutron | >=11.0.0<11.0.7 | |
OpenStack Neutron | >=12.0.0<12.0.6 | |
OpenStack Neutron | >=13.0.0<13.0.3 | |
Redhat Openstack | =10 | |
Redhat Openstack | =13 | |
Redhat Openstack | =14 | |
Debian Debian Linux | =9.0 | |
pip/neutron | >=13.0.0<13.0.3 | 13.0.3 |
pip/neutron | >=12.0.0<12.0.6 | 12.0.6 |
pip/neutron | >=11.0.0<11.0.7 | 11.0.7 |
pip/neutron | <10.0.8 | 10.0.8 |
debian/neutron | 2:17.2.1-0+deb11u1 2:21.0.0-7 2:25.0.0-3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-9735 is a vulnerability in the iptables firewall module in OpenStack Neutron that allows an authenticated user to set a destination port in a security group rule along with a protocol that doesn't support that option.
The severity of CVE-2019-9735 is high, with a CVSS score of 6.5.
CVE-2019-9735 affects OpenStack Neutron versions before 10.0.8, 11.x before 11.0.7, 12.x before 12.0.6, and 13.x before 13.0.3.
To fix CVE-2019-9735 on Debian, you can update the neutron package to version 2:13.0.7+git.2021.09.27.bace3d1890-0+deb10u1.
To fix CVE-2019-9735 on Ubuntu, you can update the neutron package to version 2:12.0.6-0ubuntu1.