{"id":"CVE-2019-9735","details":"An issue was discovered in the iptables firewall module in OpenStack Neutron before 10.0.8, 11.x before 11.0.7, 12.x before 12.0.6, and 13.x before 13.0.3. By setting a destination port in a security group rule along with a protocol that doesn't support that option (for example, VRRP), an authenticated user may block further application of security group rules for instances from any project/tenant on the compute hosts to which it's applied. (Only deployments using the iptables security group driver are affected.)","aliases":["GHSA-9773-3fqg-8w25","PYSEC-2019-190"],"modified":"2026-04-10T04:20:56.983950Z","published":"2019-03-13T02:29:00.277Z","related":["SUSE-SU-2019:2219-1","SUSE-SU-2019:2267-1"],"references":[{"type":"WEB","url":"https://usn.ubuntu.com/4036-1/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2019/dsa-4409"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/107390"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:0935"},{"type":"ADVISORY","url":"https://seclists.org/bugtraq/2019/Mar/24"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2019/03/18/2"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:0879"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:0916"},{"type":"FIX","url":"https://launchpad.net/bugs/1818385"},{"type":"FIX","url":"https://security.openstack.org/ossa/OSSA-2019-001.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/openstack/neutron","events":[{"introduced":"5212c9c563e9470ce9e6abd76bdef22fa652a9b3"},{"fixed":"7ba0d8fb49ad2f86683172ed6fc06fdb44b473a6"},{"introduced":"fb3f71806174bc2fae7e421268aeee61be36412d"},{"fixed":"871b86390a024f19876cda06f2775d6785400878"},{"introduced":"b6314ea6c3df11c6b27cd39844c53b65be0d9060"},{"fixed":"31a48bea869f3b7fafcf8ec2fae683456885c3cf"},{"introduced":"0"},{"last_affected":"71f2d2bc90aaf9ee696cd4e4f29879ba6c5703b5"}],"database_specific":{"versions":[{"introduced":"11.0.0"},{"fixed":"11.0.7"},{"introduced":"12.0.0"},{"fixed":"12.0.6"},{"introduced":"13.0.0"},{"fixed":"13.0.3"},{"introduced":"0"},{"last_affected":"9.0"}]}}],"versions":["11.0.0","11.0.0.0rc3","11.0.1","11.0.2","11.0.3","11.0.4","11.0.5","11.0.6","12.0.0","12.0.0.0rc2","12.0.1","12.0.2","12.0.3","12.0.4","12.0.5","13.0.0","13.0.0.0rc2","13.0.1","13.0.2","2013.1.g3","2013.2.b2","2013.2.rc1","2014.1.b1","2014.1.b2","2014.1.b3","2014.1.rc1","2014.2.b1","2014.2.b2","2014.2.b3","2014.2.rc1","2015.1.0b1","2015.1.0b2","2015.1.0b3","2015.1.0rc1","7.0.0.0b1","7.0.0.0b2","7.0.0.0b3","7.0.0a0","8.0.0.0b1","8.0.0.0b2","8.0.0.0b3","8.0.0.0rc1","9.0.0","9.0.0.0b1","9.0.0.0b2","9.0.0.0b3","9.0.0.0rc1","9.0.0.0rc2","9.0.0.0rc3","essex-1","essex-3","folsom-1","folsom-3","grizzly-1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-9735.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"10.0.8"}]},{"events":[{"introduced":"0"},{"last_affected":"10"}]},{"events":[{"introduced":"0"},{"last_affected":"13"}]},{"events":[{"introduced":"0"},{"last_affected":"14"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}