==========================================================================
Ubuntu Security Notice USN-2255-1
June 25, 2014
neutron vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 14.04 LTS
– Ubuntu 13.10
Summary:
Several security issues were fixed in OpenStack Neutron.
Software Description:
– neutron: OpenStack Virtual Network Service
Details:
Darragh O’Reilly discovered that the Ubuntu packaging for OpenStack Neutron
did not properly set up its sudo configuration. If a different flaw was
found in OpenStack Neutron, this vulnerability could be used to escalate
privileges. (CVE-2013-6433)
Stephen Ma and Christoph Thiel discovered that the openvswitch-agent in
OpenStack Neutron did not properly perform input validation when creating
security group rules when specifying –remote-ip-prefix. A remote
authenticated attacker could exploit this to prevent application of
additional rules. (CVE-2014-0187)
Thiago Martins discovered that OpenStack Neutron would inappropriately
apply SNAT rules to IPv6 subnets when using the L3-agent. A remote
authenticated attacker could exploit this to prevent floating IPv4
addresses from being attached throughout the cloud. (CVE-2014-4167)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 LTS:
python-neutron 1:2014.1-0ubuntu1.3
Ubuntu 13.10:
python-neutron 1:2013.2.3-0ubuntu1.5
In general, a standard system update will make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2255-1
CVE-2013-6433, CVE-2014-0187, CVE-2014-4167
Package Information:
https://launchpad.net/ubuntu/+source/neutron/1:2014.1-0ubuntu1.3
https://launchpad.net/ubuntu/+source/neutron/1:2013.2.3-0ubuntu1.5
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
Comment: Using GnuPG with Thunderbird – http://www.enigmail.net/
iQIcBAEBCgAGBQJTq0MLAAoJEFHb3FjMVZVzkYkP/i4UR/4CME/bVwQCDTvkjjUL
ZEcVgpYg1cZSAuBOHctUyED1OZdyFI0xXm1LZua0BQvZHrVpdQEDcCnRD19/o5CF
yvAU8Y70BHQ0/3iQGq3Ml8q6uOuwBjfxJ+SUkPJNfetZlXcdXbT94wN+oIZ8o3Q4
2KA4qc1/DCqgsB4gpSlGRykovIrz1wSbJjq1avTftmdV+sToRQD+LqWFm116Vonj
XFYR2HXfYyE283FQDsumFCxwqmkuLUdkQQXLv1JclKkFUM2mlQDk70vLGGk0uWwx
4/rKln3HJghj3h6MoLxJsl/hB8WF/beOaeoW1gzQK3Idhlw5m1HOaja77eAHJiVs
LiEass4mcs0i5FDqsoI7pxQdZE6Tc1CUYIaptxdCks1K4tbjcz89sL2WGyGqwyEy
UY5tkRF/dTdjPt+Mla3yoqcXOV+nzC7TrUVOF8drW7AKDNrPjuXUce0m9pJcDyyb
gvUnvyQy58Si4lCYPQF7h35TCPfNgkFtuibJHLFIxjpOA64n8fqHgsdxtLmUajXw
j9xvjN3F0EVT0s/DTnLtdbgQBofLrt764TUV3EB/MCXDVmGoGsLg5uw+AVeDmI12
P66WWs/cF7chM68iOoPfO4PlDJRvRekLB9nRHGxtoXdcfgzdpdtA0JL3h24Kqpm7
kW5fzkvlU7K+WNEMclqa
=yeW0
—–END PGP SIGNATURE—–
—