Bug 887348 - (CVE-2014-3555) VUL-0: CVE-2014-3555: openstack-neutron: Denial of Service in Neutron allowed address pair
(CVE-2014-3555)
VUL-0: CVE-2014-3555: openstack-neutron: Denial of Service in Neutron allowed...
Status: RESOLVED FIXED
Classification: Novell Products
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents
unspecified
Other Other
: P3 - Medium : Minor
: ---
Assigned To: Security Team bot
Security Team bot
maint:released:sle11-sp3-uptu:58461
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2014-07-15 14:41 UTC by Victor Pereira
Modified: 2019-06-06 14:39 UTC (History)
3 users (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments
suggested patch stable havana (4.25 KB, patch)
2014-07-15 14:43 UTC, Victor Pereira
Details | Diff
suggested patch stable icehouse (4.25 KB, patch)
2014-07-15 14:44 UTC, Victor Pereira
Details | Diff

Note You need to log in before you can comment on or make changes to this bug.
Description Victor Pereira 2014-07-15 14:41:10 UTC
Title: Denial of Service in Neutron allowed address pair
Reporter: Liping Mao (Cisco)
Products: Neutron
Versions: up to 2013.2.3, and 2014.1 versions up to 2014.1.1

Description:
Liping Mao from Cisco reported a denial of service vulnerability in
Neutron's handling of allowed address pair. By creating a large number
of allowed address pairs, an authenticated user may overwhelm neutron
firewall rules and render compute nodes unusable. All Neutron setups are
affected.

Proposed patch:
See attached patches. Unless a flaw is discovered in them, these patches
will be merged to stable/havana, stable/icehouse and master (Juno
development branch) on the public disclosure date.
Comment 2 Victor Pereira 2014-07-15 14:43:21 UTC
Created attachment 598660 [details]
suggested patch stable havana
Comment 3 Victor Pereira 2014-07-15 14:44:22 UTC
Created attachment 598662 [details]
suggested patch stable icehouse
Comment 4 Swamp Workflow Management 2014-07-15 22:00:13 UTC
bugbot adjusting priority
Comment 5 SMASH SMASH 2014-07-16 15:20:13 UTC
Affected packages:

SLE-11-SP3-CLOUD4: openstack-neutron
SLE-11-SP3-PRODUCTS: openstack-neutron
SLE-11-SP3-UPTU: openstack-neutron
Comment 6 Marcus Meissner 2014-07-21 15:46:57 UTC
OpenStack Security Advisory: 2014-025
CVE: CVE-2014-3555
Date: July 17, 2014
Title: Denial of Service in Neutron allowed address pair
Reporter: Liping Mao (Cisco)
Products: Neutron
Versions: up to 2013.2.3, and 2014.1 versions up to 2014.1.1

Description:
Liping Mao from Cisco reported a denial of service vulnerability in
Neutron's handling of allowed address pair. By creating a large number
of allowed address pairs, an authenticated user may overwhelm neutron
firewall rules and render compute nodes unusable. All Neutron setups are
affected.

Juno (development branch) fix:
https://review.openstack.org/107734

Icehouse fix:
https://review.openstack.org/107733

Havana fix:
https://review.openstack.org/107731

Notes:
This fix will be included in the Juno-2 development milestone and in
future 2013.2.4 and 2014.1.2 releases.

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3555
https://launchpad.net/bugs/1336207

--
Tristan Cacqueray
OpenStack Vulnerability Management Team
Comment 7 Bernhard Wiedemann 2014-07-24 11:19:52 UTC
submitted
https://build.suse.de/request/show/41740 Cloud3 / openstack-neutron
Comment 8 Swamp Workflow Management 2014-07-29 13:46:23 UTC
An update workflow for this issue was started.
This issue was rated as moderate.
Please submit fixed packages until 2014-08-12.
When done, reassign the bug to security-team@suse.de.
https://swamp.suse.de/webswamp/wf/58458
Comment 9 Swamp Workflow Management 2014-08-18 23:04:37 UTC
SUSE-SU-2014:1034-1: An update that fixes one vulnerability is now available.

Category: security (moderate)
Bug References: 887348
CVE References: CVE-2014-3555
Sources used:
SUSE Cloud 3 (src):    openstack-neutron-2013.2.4.dev93.gf569afd-0.7.1, openstack-neutron-doc-2013.2.4.dev93.gf569afd-0.7.1
Comment 10 Alexander Bergmann 2014-08-19 08:19:36 UTC
Fix was released. Closing bug.
Comment 11 Victor Pereira 2015-07-23 08:56:16 UTC
resolved, fixed and released.