Access Restriction Bypass Affecting nova package, versions <2012.1-2
Snyk CVSS
Attack Complexity
Low
User Interaction
Required
Threat Intelligence
EPSS
1.29% (86th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN11-NOVA-526505
- published 7 Jun 2012
- disclosed 7 Jun 2012
Introduced: 7 Jun 2012
CVE-2012-2101 Open this link in a new tabHow to fix?
Upgrade Debian:11
nova
to version 2012.1-2 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream nova
package and not the nova
package as distributed by Debian
.
See How to fix?
for Debian:11
relevant fixed versions and status.
Openstack Compute (Nova) Folsom, 2012.1, and 2011.3 does not limit the number of security group rules, which allows remote authenticated users with certain permissions to cause a denial of service (CPU and hard drive consumption) via a network request that triggers a large number of iptables rules.
References
- ADVISORY
- Fedora Security Announcement
- Fedora Security Announcement
- GitHub Commit
- GitHub Commit
- GitHub Commit
- https://bugs.launchpad.net/nova/+bug/969545
- https://lists.launchpad.net/openstack/msg10268.html
- http://ubuntu.com/usn/usn-1438-1
- Secunia Advisory
- Secunia Advisory
- Ubuntu CVE Tracker
- X-force Vulnerability Report
- OSVDB