RHEL 6 : openstack-packstack (RHSA-2014:0233)

high Nessus Plugin ID 234383

Synopsis

The remote Red Hat host is missing a security update for openstack-packstack.

Description

The remote Redhat Enterprise Linux 6 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2014:0233 advisory.

PackStack is a command-line utility that uses Puppet modules to support rapid deployment of OpenStack on existing servers over an SSH connection.
PackStack is suitable for deploying both single node proof-of-concept installations and more complex multi-node installations.

It was found that PackStack did not correctly install the rules defined in the default security groups when deployed on OpenStack Networking (neutron), allowing network connections to be made to systems that should not have been accessible. (CVE-2014-0071)

This update also fixes the following bugs:

* Previously, swift's object versioning was disabled by default. With this update, this feature is now enabled in the default configuration file ('allow_versions true' in /etc/swift/container-server.conf). (BZ#967308)

* Previously, it was not possible to run neutron with Open vSwitch using Virtual Extensible LAN (VXLAN). This update adds support for VXLAN in neutron. (BZ#1021778)

* PackStack failed to complete the deployment of OpenStack due to the MongoDB service (mongod) being terminated by systemd. This was because mongod, when first started, exceeded the timeout value set by systemd.
With this update, mongod uses small files when it is initially started, and no longer exceeds systemd's timeout value. (BZ#1036207)

* Previously, services for OpenStack Compute and other OpenStack components ran in debug mode by default. With this update, the CONFIG_DEBUG_MODE configuration parameter has been added. When this parameter is set to 'y', all OpenStack services will run in debug mode. By default, debug mode is disabled. (BZ#1048041)

Note: Currently, PackStack does not support deployment of the ML2 Neutron plug-in. The ML2 plug-in can be used in manual configurations, or by deploying initially with the Open vSwitch plug-in using PackStack and converting the installation to use ML2. This method is described at http://openstack.redhat.com/Modular_Layer_2_%28ML2%29_Plugin. The progress on fixing this bug can be followed in Red Hat Bugzilla bug 1017144.

All openstack-packstack users are advised to upgrade to these updated packages, which correct these issues.

Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Update the RHEL openstack-packstack package based on the guidance in RHSA-2014:0233.

See Also

https://access.redhat.com/security/updates/classification/#important

https://bugzilla.redhat.com/show_bug.cgi?id=967308

https://bugzilla.redhat.com/show_bug.cgi?id=1021778

https://bugzilla.redhat.com/show_bug.cgi?id=1029671

https://bugzilla.redhat.com/show_bug.cgi?id=1034538

https://bugzilla.redhat.com/show_bug.cgi?id=1036207

https://bugzilla.redhat.com/show_bug.cgi?id=1042529

https://bugzilla.redhat.com/show_bug.cgi?id=1048041

https://bugzilla.redhat.com/show_bug.cgi?id=1048705

https://bugzilla.redhat.com/show_bug.cgi?id=1054498

https://bugzilla.redhat.com/show_bug.cgi?id=1064163

https://bugzilla.redhat.com/show_bug.cgi?id=1069215

http://www.nessus.org/u?51c17347

https://access.redhat.com/errata/RHSA-2014:0233

Plugin Details

Severity: High

ID: 234383

File Name: redhat-RHSA-2014-0233.nasl

Version: 1.1

Type: local

Agent: unix

Published: 4/15/2025

Updated: 4/15/2025

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

Vendor

Vendor Severity: Important

CVSS v2

Risk Factor: Medium

Base Score: 6.4

Temporal Score: 4.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N

CVSS Score Source: CVE-2014-0071

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:packstack-modules-puppet, cpe:/o:redhat:enterprise_linux:6, p-cpe:/a:redhat:enterprise_linux:openstack-packstack

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 3/4/2014

Vulnerability Publication Date: 2/12/2014

Reference Information

CVE: CVE-2014-0071

RHSA: 2014:0233