Updated openstack-neutron packages that fix two security issues, severalbugs, and add various enhancements are now available for Red Hat EnterpriseLinux OpenStack Platform 4.0.The Red Hat Security Response Team has rated this update as having Moderatesecurity impact. Common Vulnerability Scoring System (CVSS) base scores,which give detailed severity ratings, are available for each vulnerabilityfrom the CVE links in the References section.

OpenStack Networking (neutron) is a pluggable, scalable, and API-drivensystem that provisions networking services to virtual machines. Its mainfunction is to manage connectivity to and from virtual machines. As of RedHat Enterprise Linux OpenStack Platform 4.0, ‘neutron’ replaces ‘quantum’as the core component of OpenStack Networking.A flaw was found in the way OpenStack Networking performed authorizationchecks on created ports. An authenticated user could potentially use thisflaw to create ports on a router belonging to a different tenant, allowingunauthorized access to the network of other tenants. Note that onlyOpenStack Networking setups using plug-ins that rely on the l3-agent wereaffected. (CVE-2014-0056)It was discovered that the default sudo configuration provided in OpenStackNetworking, which is specific to the openstack-neutron package shipped byRed Hat, did not correctly specify a configuration file for rootwrap,potentially allowing an unauthenticated user to escalate their privileges.(CVE-2013-6433)Red Hat would like to thank the OpenStack project for reportingCVE-2014-0056. Upstream acknowledges Aaron Rosen from VMware as theoriginal reporter of CVE-2014-0056. The CVE-2013-6433 issue was discoveredby Kashyap Chamarthy of Red Hat.This update also fixes several bugs and adds enhancements. Documentationfor these changes is available in the Technical Notes document linked toin the References section.All openstack-neutron users are advised to upgrade to these updatedpackages, which correct these issues and add these enhancements.
Before applying this update, make sure all previously released erratarelevant to your system have been applied.This update is available via the Red Hat Network. Details on how touse the Red Hat Network to apply this update are available athttps://access.redhat.com/site/articles/11258Red Hat OpenStack 4.0

SRPMS:
openstack-neutron-2013.2.3-7.el6ost.src.rpm
    MD5: ee96eeba66d237d7a821c100a15e5edcSHA-256: 983d96d08e5a065c9644db8244e83f9f039c70d68d67b43ab0f99ab9dbb09635
 
x86_64:
openstack-neutron-2013.2.3-7.el6ost.noarch.rpm
    MD5: 5302b0a9acef1d10dc2bc1887515a25fSHA-256: 3b6d92d46cbcddc7a7d80e8ef68b3bbb22ebe63cab85786ba16c9905bf254310
openstack-neutron-bigswitch-2013.2.3-7.el6ost.noarch.rpm
    MD5: 3ab4e9b39d77dacc9879c6f36d8db244SHA-256: 43f6de6d6659baa7f36a6ba09b202711ac1138c52903d9b8a04b5a28734d4af6
openstack-neutron-brocade-2013.2.3-7.el6ost.noarch.rpm
    MD5: 043eb06bc5548514f4525c7dec7b2119SHA-256: 14197721bfa504d255653ed8518d90c3af639854d71884980ae8a3f1f00ac1ff
openstack-neutron-cisco-2013.2.3-7.el6ost.noarch.rpm
    MD5: 90a420d762bc7c5b1251c63fdf088c98SHA-256: 4d1a33ca9669bcdc396455c273d374ab289b2079dbba8ea449db2a477a0b713c
openstack-neutron-hyperv-2013.2.3-7.el6ost.noarch.rpm
    MD5: 18e5a685ee2f6bb38c6a2891c9e275f0SHA-256: ebb74eda5af04eb72215dc9885a2ca0547a3e079745bb9f977655fb62f1733e7
openstack-neutron-linuxbridge-2013.2.3-7.el6ost.noarch.rpm
    MD5: 30b356cd356015180dfa4ae5a4540913SHA-256: fa112e7f58ea04ef99b5cddf26f5e3d8efd7d11c2b48d66dbae2bdc1140ccf11
openstack-neutron-mellanox-2013.2.3-7.el6ost.noarch.rpm
    MD5: 775d2ee6a9d1a2676b4cde17e19b3a2cSHA-256: 5e24b3594aecff58547890bb509053c3040c2cac580d21601381b4a569999ffe
openstack-neutron-metaplugin-2013.2.3-7.el6ost.noarch.rpm
    MD5: e5aa015fe30870bb5c9048df3073a5ecSHA-256: f0b7989ef711bbca5b04957b8c8bc12e374b976747ed82c896febf7451da65bf
openstack-neutron-metering-agent-2013.2.3-7.el6ost.noarch.rpm
    MD5: 489ff3b9ecdc4af60b93fd9caa81234fSHA-256: 78f6d462b2712e9747a137f093b058be125d79d6f7aeecaacc10aa4d99c9ff19
openstack-neutron-midonet-2013.2.3-7.el6ost.noarch.rpm
    MD5: 71a57e88876ca4fd95c152caa82f44d0SHA-256: a8669a0d82177206381f2047239975cb2321c92b66efb9445ea3ae1ca561ff6f
openstack-neutron-ml2-2013.2.3-7.el6ost.noarch.rpm
    MD5: d1e34784d776cd1355b9a027d8e5a9a1SHA-256: ca33eb3d3f627c80e9f9370c28b0cffd1961bce7105b308d9f325979895da84e
openstack-neutron-nec-2013.2.3-7.el6ost.noarch.rpm
    MD5: 0ac50ab0dd4f224c3960252988099450SHA-256: 17af2a0cab6698325f223c469a6db3830926c04b13e020d6445728244ae126be
openstack-neutron-nicira-2013.2.3-7.el6ost.noarch.rpm
    MD5: 6f23658fe2838c40080667db7ed76d94SHA-256: a6491d2b35c07fd2ccd82d4e7033e456a6bff2ec84ef0227e93a75fcb8a89c97
openstack-neutron-openvswitch-2013.2.3-7.el6ost.noarch.rpm
    MD5: 36bdb17118eabd8da0d09b2a11a5f242SHA-256: 8515ec3664eb3a50539734d757e711f1d95cddbecab31ac0a8186ed343176707
openstack-neutron-plumgrid-2013.2.3-7.el6ost.noarch.rpm
    MD5: d08adea3d0de2c2a522c9d23ae9f687bSHA-256: bfe4a392b6b4be89090ebb1580f3393cd464001432c5bd34cd0c253f329943ca
openstack-neutron-ryu-2013.2.3-7.el6ost.noarch.rpm
    MD5: 3536d3d869436780c6a69cab9ee2748bSHA-256: 6b25bb64c8a54b910a9a223b6eb881fa53c7fdfb8ca29568973d82b241cbb57c
openstack-neutron-vpn-agent-2013.2.3-7.el6ost.noarch.rpm
    MD5: 18e4aa462d99321e0a4c399ecfc577baSHA-256: 3ed6184c5df47baa08826bbf6f1f555ed28e3f8aa8e332b9fd8e89c772d7a39b
python-neutron-2013.2.3-7.el6ost.noarch.rpm
    MD5: 9c507a7a43f212d579ddf383a03c50bfSHA-256: f7d59fbf9375fed790c49972efc735f5c02b2b49c811f26ca51783a5a7ff8d21
 
(The unlinked packages above are only available from the Red Hat Network)
1036523 – neutron-server connection to multiple qpidd instances is broken1039812 – CVE-2013-6433 openstack-quantum/openstack-neutron: rootwrap sudo config allows potential privilege escalation1050962 – neutron should not specify signing_dir in neutron-dist.conf1051028 – neutron-dhcp-agent doesn’t clean after itself when service is shut down1051036 – neutron-l3-agent doesn’t clean after itself when service is shut down1051444 – [neutron]: neutron-dhcp-agent and neutron-l3-agent won’t respawn child processes if something goes wrong1060709 – neutron-server start should survive lack of db availability1060711 – neutron qpid reconnection delay must be more accurate1063141 – CVE-2014-0056 OpenStack Neutron: insufficient authorization checks when creating ports1071891 – Old path for LB driver is used after upgrade from RHOS 31075833 – Reduce debug logging of qpid output1076994 – Full /var prevents pid file being written, but daemon starts anyway1077487 – dnsmasq can’t handle ipv6 addresses; triggers constant resyncs of dhcp1080071 – Nexus plugin db migration issues1081159 – L3 agent restart causes network outage1084535 – Rebase openstack-neutron to 2013.2.31086077 – RPC error in neutron-server leads to cascading failure1098578 – neutron-vpn-agent does not use the /etc/neutron/fwaas_driver.ini

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

Leave a Reply