-
CVSS Score
-The vulnerability stemmed from two key issues: 1) Untagged ports remained in trunk mode during migration due to port_dead() not enforcing dead VLAN tagging on unconfigured ports. 2) Low-priority drop rules in drop_port() allowed traffic leakage. Both functions were explicitly modified in security patches (added dead VLAN enforcement for untagged ports and increased drop rule priority to 65535), directly correlating with the described attack vector.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| neutron | pip | = 13.0.0.0b1 | 13.0.0.0b2 |
| neutron | pip | >= 12.0.0, < 12.0.3 | 12.0.3 |
| neutron | pip | >= 11.0.0, < 11.0.5 | 11.0.5 |