CVE-2021-40797: OpenStack Neutron Denial of Service vulnerability
6.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.56361%
CWE
Published
5/24/2022
Updated
9/25/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| neutron | pip | < 16.4.1 | 16.4.1 |
| neutron | pip | >= 17.0.0, < 17.2.1 | 17.2.1 |
| neutron | pip | >= 18.0.0, < 18.1.1 | 18.1.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from the use of routes.middleware.RoutesMiddleware with singleton=True in Neutron's API middleware stack. The commit e610a5eb9 explicitly fixes this by setting singleton=False. The singleton=True configuration caused thread-local storage (via _RequestConfig) to accumulate indefinitely when processing invalid API requests due to incompatibility with eventlet's monkeypatched threading.local implementation. This matches the CWE-772 (resource retention) description and the patch's focus on this parameter change.