CVE-2015-5240
Severity CVSS v4.0:
Pending analysis
Type:
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Publication date:
27/10/2015
Last modified:
12/04/2025
Description
Race condition in OpenStack Neutron before 2014.2.4 and 2015.1 before 2015.1.2, when using the ML2 plugin or the security groups AMQP API, allows remote authenticated users to bypass IP anti-spoofing controls by changing the device owner of a port to start with network: before the security group rules are applied.
Impact
Base Score 2.0
3.50
Severity 2.0
LOW
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:openstack:neutron:2014.2.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:openstack:neutron:2015.1.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:openstack:neutron:2015.1.1:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://rhn.redhat.com/errata/RHSA-2015-1909.html
- http://www.openwall.com/lists/oss-security/2015/09/08/9
- https://bugs.launchpad.net/neutron/+bug/1489111
- https://bugzilla.redhat.com/show_bug.cgi?id=1258458
- https://security.openstack.org/ossa/OSSA-2015-018.html
- http://rhn.redhat.com/errata/RHSA-2015-1909.html
- http://www.openwall.com/lists/oss-security/2015/09/08/9
- https://bugs.launchpad.net/neutron/+bug/1489111
- https://bugzilla.redhat.com/show_bug.cgi?id=1258458
- https://security.openstack.org/ossa/OSSA-2015-018.html



