CVE-2022-3277

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2022-3277
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-3277.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-3277
Aliases
Related
Published
2023-03-06T23:15:10Z
Modified
2024-09-18T03:21:22.867774Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

An uncontrolled resource consumption flaw was found in openstack-neutron. This flaw allows a remote authenticated user to query a list of security groups for an invalid project. This issue creates resources that are unconstrained by the user's quota. If a malicious user were to submit a significant number of requests, this could lead to a denial of service.

References

Affected packages

Debian:11 / neutron

Package

Name
neutron
Purl
pkg:deb/debian/neutron?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2:17.*

2:17.1.1-6
2:17.2.1-0+deb11u1

2:18.*

2:18.0.0~rc1-1
2:18.0.0-1
2:18.0.0-2
2:18.0.0-3
2:18.0.0-4
2:18.0.0-5
2:18.0.0-6
2:18.1.0-1
2:18.1.0-2
2:18.1.0-3

2:19.*

2:19.0.0~rc1-1
2:19.0.0~rc1-3
2:19.0.0-1
2:19.1.0-1

2:20.*

2:20.0.0~rc1-1
2:20.0.0~rc1-2
2:20.0.0-1
2:20.0.0-2
2:20.2.0-1

2:21.*

2:21.0.0~rc1-1
2:21.0.0~rc1-2
2:21.0.0~rc1-3
2:21.0.0-1
2:21.0.0-2
2:21.0.0-3
2:21.0.0-4
2:21.0.0-5
2:21.0.0-6
2:21.0.0-7

2:22.*

2:22.0.0~rc1-1
2:22.0.0~rc1-2
2:22.0.0-1
2:22.0.0-2
2:22.0.1-1
2:22.0.1-2

2:23.*

2:23.0.0~b3-1
2:23.0.0~rc1-1
2:23.0.0-1
2:23.0.0-2

2:24.*

2:24.0.0~rc1-1
2:24.0.0-1
2:24.0.0-2
2:24.0.0-3
2:24.0.0-3.1

2:25.*

2:25.0.0~rc1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / neutron

Package

Name
neutron
Purl
pkg:deb/debian/neutron?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2:21.*

2:21.0.0-7

2:22.*

2:22.0.0~rc1-1
2:22.0.0~rc1-2
2:22.0.0-1
2:22.0.0-2
2:22.0.1-1
2:22.0.1-2

2:23.*

2:23.0.0~b3-1
2:23.0.0~rc1-1
2:23.0.0-1
2:23.0.0-2

2:24.*

2:24.0.0~rc1-1
2:24.0.0-1
2:24.0.0-2
2:24.0.0-3
2:24.0.0-3.1

2:25.*

2:25.0.0~rc1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / neutron

Package

Name
neutron
Purl
pkg:deb/debian/neutron?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2:21.*

2:21.0.0-7

2:22.*

2:22.0.0~rc1-1
2:22.0.0~rc1-2
2:22.0.0-1
2:22.0.0-2
2:22.0.1-1
2:22.0.1-2

2:23.*

2:23.0.0~b3-1
2:23.0.0~rc1-1
2:23.0.0-1
2:23.0.0-2

2:24.*

2:24.0.0~rc1-1
2:24.0.0-1
2:24.0.0-2
2:24.0.0-3
2:24.0.0-3.1

2:25.*

2:25.0.0~rc1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Git / github.com/openstack/neutron

Affected ranges

Type
GIT
Repo
https://github.com/openstack/neutron
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

10.*

10.0.0.0b1
10.0.0.0b2
10.0.0.0b3
10.0.0.0rc1

11.*

11.0.0.0b1
11.0.0.0b2
11.0.0.0b3
11.0.0.0rc1

12.*

12.0.0.0b1
12.0.0.0b2
12.0.0.0b3
12.0.0.0rc1

13.*

13.0.0.0b1
13.0.0.0b2
13.0.0.0b3
13.0.0.0rc1

14.*

14.0.0
14.0.0.0b1
14.0.0.0b2
14.0.0.0b3
14.0.0.0rc1

15.*

15.0.0.0b1
15.0.0.0rc1

16.*

16.0.0.0b1
16.0.0.0rc1

17.*

17.0.0.0rc1

18.*

18.0.0
18.0.0.0rc1
18.0.0.0rc2
18.1.0
18.1.1
18.2.0
18.3.0
18.4.0
18.5.0

2011.*

2011.3

2013.*

2013.1.g3
2013.2.b2
2013.2.rc1

2014.*

2014.1.b1
2014.1.b2
2014.1.b3
2014.1.rc1
2014.2
2014.2.b1
2014.2.b2
2014.2.b3
2014.2.rc1
2014.2.rc2
2014.2.rc3

2015.*

2015.1.0
2015.1.0b1
2015.1.0b2
2015.1.0b3
2015.1.0rc1
2015.1.0rc2
2015.1.0rc3

7.*

7.0.0
7.0.0.0b1
7.0.0.0b2
7.0.0.0b3
7.0.0.0rc1
7.0.0.0rc2
7.0.0.0rc3
7.0.0a0

8.*

8.0.0
8.0.0.0b1
8.0.0.0b2
8.0.0.0b3
8.0.0.0rc1
8.0.0.0rc2
8.0.0.0rc3
8.1.0

9.*

9.0.0.0b1
9.0.0.0b2
9.0.0.0b3
9.0.0.0rc1

Other

diablo-eol
essex-1
essex-3
folsom-1
folsom-3
grizzly-1