First published: Thu Sep 22 2022(Updated: )
An uncontrolled resource consumption flaw was found in openstack-neutron. This flaw allows a remote authenticated user to query a list of security groups for an invalid project. This issue creates resources that are unconstrained by the user's quota. If a malicious user were to submit a significant number of requests, this could lead to a denial of service.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenStack Neutron | <18.6.0 | |
OpenStack Neutron | >=19.0.0<19.5.0 | |
Redhat Openstack Platform | =13.0 | |
Redhat Openstack Platform | =16.1 | |
Redhat Openstack Platform | =16.2 | |
pip/neutron | >=20.0.0.0rc1<20.3.0 | 20.3.0 |
pip/neutron | <18.6.0 | 18.6.0 |
pip/neutron | >=19.0.0.0rc1<19.5.0 | 19.5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-3277 is an uncontrolled resource consumption flaw in openstack-neutron that allows a remote authenticated user to query a list of security groups for an invalid project, creating resources unconstrained by the user's quota.
No, CVE-2022-3277 has a severity rating of medium.
To fix CVE-2022-3277, upgrade to a version of OpenStack Neutron or Redhat Openstack Platform that includes the necessary patches.
OpenStack Neutron versions up to 18.6.0, OpenStack Neutron versions between 19.0.0 and 19.5.0, Redhat Openstack Platform 13.0, 16.1, and 16.2 are affected by CVE-2022-3277.
Yes, you can find references for CVE-2022-3277 at the following links: [Bugzilla Redhat](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=2129211), [OpenDev Review](https://review.opendev.org/c/openstack/python-openstackclient/+/355405), [Redhat Errata](https://access.redhat.com/errata/RHSA-2022:8855).