First published: Wed Sep 08 2021(Updated: )
An issue was discovered in the routes middleware in OpenStack Neutron before 16.4.1, 17.x before 17.2.1, and 18.x before 18.1.1. By making API requests involving nonexistent controllers, an authenticated user may cause the API worker to consume increasing amounts of memory, resulting in API performance degradation or denial of service.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenStack Neutron | <16.4.1 | |
OpenStack Neutron | >=17.0.0<17.2.1 | |
OpenStack Neutron | >=18.0.0<18.1.1 | |
pip/neutron | >=18.0.0<18.1.1 | 18.1.1 |
pip/neutron | >=17.0.0<17.2.1 | 17.2.1 |
pip/neutron | <16.4.1 | 16.4.1 |
<16.4.1 | ||
>=17.0.0<17.2.1 | ||
>=18.0.0<18.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-40797 is medium with a CVSS score of 6.5.
OpenStack Neutron versions before 16.4.1, between 17.0.0 and 17.2.1, and between 18.0.0 and 18.1.1 are affected by CVE-2021-40797.
An authenticated user can cause the API worker to consume increasing amounts of memory, resulting in API performance degradation.
Update to OpenStack Neutron version 16.4.1 or later, 17.2.1 or later, or 18.1.1 or later to mitigate CVE-2021-40797.
You can find more information about CVE-2021-40797 on the OpenStack Security Advisory (OSSA) page and the OpenWall mailing list.