CVE-2022-3277

NameCVE-2022-3277
DescriptionAn uncontrolled resource consumption flaw was found in openstack-neutron. This flaw allows a remote authenticated user to query a list of security groups for an invalid project. This issue creates resources that are unconstrained by the user's quota. If a malicious user were to submit a significant number of requests, this could lead to a denial of service.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1027150

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
neutron (PTS)jessie2014.1.3-12vulnerable
stretch (security), stretch (lts), stretch2:9.1.1-3+deb9u3vulnerable
buster (security), buster, buster (lts)2:13.0.7+git.2021.09.27.bace3d1890-0+deb10u1vulnerable
bullseye (security), bullseye2:17.2.1-0+deb11u1vulnerable
bookworm2:21.0.0-7vulnerable
sid, trixie2:25.0.0-1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
neutronsourcejessie(unfixed)end-of-life
neutronsourcestretch(unfixed)end-of-life
neutronsource(unstable)(unfixed)1027150

Notes

[bookworm] - neutron <postponed> (Minor issue, revisit when fixed upstream)
[bullseye] - neutron <no-dsa> (Minor issue)
[buster] - neutron <no-dsa> (Minor issue)
https://bugzilla.redhat.com/show_bug.cgi?id=2129193
When fixing this issue this might open CVE-2023-3637 if fixed incompletely.

Search for package or bug name: Reporting problems