On 4/6/19 9:49 AM, Salvatore Bonaccorso wrote:
> Source: neutron
> Version: 2:13.0.2-14
> Severity: grave
> Tags: security upstream
> Justification: user security hole
> Forwarded: https://bugs.launchpad.net/ossa/+bug/1813007
> 
> Hi,
> 
> The following vulnerability was published for neutron.
> 
> CVE-2019-10876[0]:
> | An issue was discovered in OpenStack Neutron 11.x before 11.0.7, 12.x
> | before 12.0.6, and 13.x before 13.0.3. By creating two security groups
> | with separate/overlapping port ranges, an authenticated user may
> | prevent Neutron from being able to configure networks on any compute
> | nodes where those security groups are present, because of an Open
> | vSwitch (OVS) firewall KeyError. All Neutron deployments utilizing
> | neutron-openvswitch-agent are affected.
> 
> 
> If you fix the vulnerability please also make sure to include the
> CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
> 
> For further information see:
> 
> [0] https://security-tracker.debian.org/tracker/CVE-2019-10876
>     https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10876
> [1] https://bugs.launchpad.net/ossa/+bug/1813007
> 
> Please adjust the affected versions in the BTS as needed.
> 
> Regards,
> Salvatore

Hi Salvatore,

I had a look at the code, and it changed a lot since the version in
Stretch, which doesn't seem to have the issue.

Moreover, if you read closely
https://bugs.launchpad.net/ossa/+bug/1813007, and especially comment
#48, it looks like this issue is only there since OpenStack Pike. The
version of OpenStack that is in Stretch is Newton (so, one year before
that). Therefore, Stretch (and before) isn't affected. Please update the
security tracker.

I have uploaded a fix for Rocky (currently in Sid/Buster), and will ask
for the unblock on Monday.

Cheers,

Thomas Goirand (zigo)

Reply via email to