GHSA-8q95-jj7p-x93x

Suggest an improvement
Source
https://github.com/advisories/GHSA-8q95-jj7p-x93x
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-8q95-jj7p-x93x/GHSA-8q95-jj7p-x93x.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-8q95-jj7p-x93x
Aliases
Published
2022-05-13T01:34:31Z
Modified
2024-12-05T05:39:06.444275Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
  • 6.0 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N CVSS Calculator
Summary
Openstack Neutron vulnerable to eavesdropping on private traffic
Details

Live-migrated instances are briefly able to inspect traffic for other instances on the same hypervisor. This brief window could be extended indefinitely if the instance's port is set administratively down prior to live-migration and kept down after the migration is complete. This is possible due to the Open vSwitch integration bridge being connected to the instance during migration. When connected to the integration bridge, all traffic for instances using the same Open vSwitch instance would potentially be visible to the migrated guest, as the required Open vSwitch VLAN filters are only applied post-migration. Versions of openstack-neutron before 13.0.0.0b2, 12.0.3, 11.0.5 are vulnerable.

Database specific
{
    "github_reviewed_at": "2024-04-08T18:57:43Z",
    "cwe_ids": [],
    "nvd_published_at": "2018-09-10T19:29:00Z",
    "severity": "MODERATE",
    "github_reviewed": true
}
References

Affected packages

PyPI / neutron

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
13.0.0.0b1
Fixed
13.0.0.0b2

Affected versions

13.*

13.0.0.0b1

PyPI / neutron

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
12.0.0
Fixed
12.0.3

Affected versions

12.*

12.0.0
12.0.1
12.0.2

PyPI / neutron

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
11.0.0
Fixed
11.0.5

Affected versions

11.*

11.0.3
11.0.4