CVE-2021-20267

Source
https://cve.org/CVERecord?id=CVE-2021-20267
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-20267.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2021-20267
Aliases
Downstream
Published
2021-05-28T19:15:07.483Z
Modified
2026-04-10T04:29:16.790667Z
Severity
  • 7.1 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H CVSS Calculator
Summary
[none]
Details

A flaw was found in openstack-neutron's default Open vSwitch firewall rules. By sending carefully crafted packets, anyone in control of a server instance connected to the virtual switch can impersonate the IPv6 addresses of other systems on the network, resulting in denial of service or in some cases possibly interception of traffic intended for other destinations. Only deployments using the Open vSwitch driver are affected. Source: OpenStack project. Versions before openstack-neutron 15.3.3, openstack-neutron 16.3.1 and openstack-neutron 17.1.1 are affected.

References

Affected packages

Git / github.com/openstack/neutron

Affected ranges

Type
GIT
Repo
https://github.com/openstack/neutron
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Database specific
{
    "versions": [
        {
            "introduced": "0"
        },
        {
            "last_affected": "18.0.0"
        },
        {
            "introduced": "0"
        },
        {
            "last_affected": "10.0"
        },
        {
            "introduced": "0"
        },
        {
            "last_affected": "13.0"
        },
        {
            "introduced": "0"
        },
        {
            "last_affected": "16.1"
        },
        {
            "introduced": "0"
        },
        {
            "last_affected": "16.2"
        }
    ]
}

Affected versions

10.*
10.0.0
10.0.0.0b1
10.0.0.0b2
10.0.0.0b3
10.0.0.0rc1
10.0.0.0rc2
11.*
11.0.0.0b1
11.0.0.0b2
11.0.0.0b3
11.0.0.0rc1
12.*
12.0.0.0b1
12.0.0.0b2
12.0.0.0b3
12.0.0.0rc1
13.*
13.0.0
13.0.0.0b1
13.0.0.0b2
13.0.0.0b3
13.0.0.0rc1
13.0.0.0rc2
14.*
14.0.0
14.0.0.0b1
14.0.0.0b2
14.0.0.0b3
14.0.0.0rc1
15.*
15.0.0.0b1
15.0.0.0rc1
16.*
16.0.0
16.0.0.0b1
16.0.0.0rc1
16.0.0.0rc2
16.1.0
16.2.0
17.*
17.0.0.0rc1
18.*
18.0.0
18.0.0.0rc1
18.0.0.0rc2
2013.*
2013.1.g3
2013.2.b2
2013.2.rc1
2014.*
2014.1.b1
2014.1.b2
2014.1.b3
2014.1.rc1
2014.2.b1
2014.2.b2
2014.2.b3
2014.2.rc1
2015.*
2015.1.0b1
2015.1.0b2
2015.1.0b3
2015.1.0rc1
7.*
7.0.0.0b1
7.0.0.0b2
7.0.0.0b3
7.0.0a0
8.*
8.0.0.0b1
8.0.0.0b2
8.0.0.0b3
8.0.0.0rc1
9.*
9.0.0.0b1
9.0.0.0b2
9.0.0.0b3
9.0.0.0rc1
Other
essex-1
essex-3
folsom-1
folsom-3
grizzly-1

Database specific

unresolved_ranges
[
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "fixed": "16.3.3"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "17.0.0"
            },
            {
                "fixed": "17.1.3"
            }
        ]
    }
]
source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-20267.json"