Bug 1118833 (CVE-2014-3555)

Summary: CVE-2014-3555 openstack-neutron: Denial of Service in Neutron allowed address pair
Product: [Other] Security Response Reporter: Vasyl Kaigorodov <vkaigoro>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: abaron, aortega, apevec, ayoung, chrisw, dallan, gkotton, gmollett, ihrachys, jrusnack, lhh, lpeer, markmc, mmcallis, nyechiel, rbryant, sclewis, security-response-team, yeylon
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
A denial of service flaw was found in neutron's handling of allowed address pairs. As there was no enforced quota on the amount of allowed address pairs, a sufficiently authorized user could possibly create a large number of firewall rules, impacting performance or potentially rendering a compute node unusable.
Story Points: ---
Clone Of: Environment:
Last Closed: 2014-09-03 01:58:54 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1121941, 1122428, 1125946, 1125947, 1125948    
Bug Blocks: 1118835    
Attachments:
Description Flags
master/juno patch for CVE-2014-3555
none
stable/havana patch for CVE-2014-3555
none
stable/icehouse patch for CVE-2014-3555 none

Description Vasyl Kaigorodov 2014-07-11 15:58:00 UTC
The OpenStack project reports:

Title: Denial of Service in Neutron allowed address pair
Reporter: Liping Mao (Cisco)
Products: Neutron
Versions: up to 2013.2.3, and 2014.1 versions up to 2014.1.1

Description:
Liping Mao from Cisco reported a denial of service vulnerability in
Neutron's handling of allowed address pair. By creating a large number
of allowed address pairs, an authenticated user may overwhelm neutron
firewall rules and render compute nodes unusable. All Neutron setups are
affected.

Comment 1 Vasyl Kaigorodov 2014-07-11 15:58:42 UTC
Acknowledgements:

Red Hat would like to thank the OpenStack project for reporting this issue. Upstream acknowledges Liping Mao from Cisco as the original reporter.

Comment 3 Vincent Danen 2014-07-14 15:58:47 UTC
Created attachment 917901 [details]
master/juno patch for CVE-2014-3555

Comment 4 Vincent Danen 2014-07-14 15:59:14 UTC
Created attachment 917902 [details]
stable/havana patch for CVE-2014-3555

Comment 5 Vincent Danen 2014-07-14 15:59:39 UTC
Created attachment 917904 [details]
stable/icehouse patch for CVE-2014-3555

Comment 6 Murray McAllister 2014-07-22 08:05:04 UTC
This issue is public:

http://seclists.org/oss-sec/2014/q3/200

Comment 8 Garth Mollett 2014-07-23 08:37:49 UTC
Created openstack-neutron tracking bugs for this issue:

Affects: fedora-20 [bug 1122428]

Comment 10 Fedora Update System 2014-08-01 06:04:00 UTC
openstack-neutron-2013.2.3-13.fc20 has been pushed to the Fedora 20 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 11 Ihar Hrachyshka 2014-08-01 08:49:09 UTC
Any updates on RHOSP trackers?

Comment 13 errata-xmlrpc 2014-08-20 04:44:48 UTC
This issue has been addressed in following products:

  OpenStack 4 for RHEL 6

Via RHSA-2014:1078 https://rhn.redhat.com/errata/RHSA-2014-1078.html

Comment 14 Martin Prpič 2014-08-25 08:53:00 UTC
IssueDescription:

A denial of service flaw was found in neutron's handling of allowed address pairs. As there was no enforced quota on the amount of allowed address pairs, a sufficiently authorized user could possibly create a large number of firewall rules, impacting performance or potentially rendering a compute node unusable.

Comment 15 errata-xmlrpc 2014-09-02 17:59:35 UTC
This issue has been addressed in following products:

  OpenStack 5 for RHEL 6

Via RHSA-2014:1120 https://rhn.redhat.com/errata/RHSA-2014-1120.html

Comment 16 errata-xmlrpc 2014-09-02 17:59:53 UTC
This issue has been addressed in following products:

  OpenStack 5 for RHEL 7

Via RHSA-2014:1119 https://rhn.redhat.com/errata/RHSA-2014-1119.html