First published: Wed Jul 12 2023(Updated: )
An uncontrolled resource consumption flaw was found in openstack-neutron. This flaw allows a remote authenticated user to query a list of security groups for an invalid project. This issue creates resources that are unconstrained by the user's quota. If a malicious user were to submit a significant number of requests, this could lead to a denial of service.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Openstack Platform | =13.0 | |
Redhat Openstack Platform | =16.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-3637 is an uncontrolled resource consumption flaw in openstack-neutron.
CVE-2023-3637 allows a remote authenticated user to query a list of security groups for an invalid project, creating unconstrained resources.
The severity of CVE-2023-3637 is medium, with a CVSS score of 6.5.
Versions up to and including 22.0.2 of the neutron package from pip, Redhat Openstack Platform 13.0, and Redhat Openstack Platform 16.2 are affected by CVE-2023-3637.
Update to a version of the neutron package from pip, Redhat Openstack Platform 13.0, or Redhat Openstack Platform 16.2 that is not affected by CVE-2023-3637.