RHEL 7 : openstack-neutron (RHSA-2014:1942)

medium Nessus Plugin ID 234425

Synopsis

The remote Red Hat host is missing a security update for openstack-neutron.

Description

The remote Redhat Enterprise Linux 7 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2014:1942 advisory.

OpenStack Networking (neutron) is a pluggable, scalable, and API-driven system that provisions networking services to virtual machines. Its main function is to manage connectivity to and from virtual machines. As of Red Hat Enterprise Linux OpenStack Platform 4.0, 'neutron' replaces 'quantum' as the core component of OpenStack Networking.

A denial of service flaw was found in the way neutron handled the 'dns_nameservers' parameter. By providing specially crafted 'dns_nameservers' values, an authenticated user could use this flaw to crash the neutron service. (CVE-2014-7821)

Red Hat would like to thank the OpenStack project for reporting this issue.
Upstream acknowledges Henry Yamauchi, Charles Neill, and Michael Xin (Rackspace) as the original reporters.

This update also fixes the following bugs:

* Prior to this update, the network name and UUID were not sent to N1KV during the subnet creation process. Consequently, N1KV was unable to properly associate the network and subnet in its local configuration.
This update addresses this issue by sending the required network name and UUID during subnet creation, with the result that they are now properly associated on the N1KV. (BZ#1118508)

* Previously, a rollback did not result in all entries being cleared from the N1KV-specific database tables, resulting in the presence of stale entries. This update addresses the issue by performing a proper cleanup of all N1KV tables. Consequently, stale entries are no longer left in the N1KV tables. (BZ#1124991)

* Previously, the N1KV OpenStack Networking (neutron) plug-in did not sent the subtype for overlay networks during the network segment pool creation process. This update addresses this issue by sending the required details during the creation process. (BZ#1130336)

All openstack-neutron users are advised to upgrade to these updated packages, which contain backported patches to correct these issues.

Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Update the RHEL openstack-neutron package based on the guidance in RHSA-2014:1942.

See Also

https://access.redhat.com/security/updates/classification/#moderate

https://bugzilla.redhat.com/show_bug.cgi?id=1124991

https://bugzilla.redhat.com/show_bug.cgi?id=1160350

https://bugzilla.redhat.com/show_bug.cgi?id=1162108

https://bugzilla.redhat.com/show_bug.cgi?id=1163457

https://bugzilla.redhat.com/show_bug.cgi?id=1163470

http://www.nessus.org/u?4d13cdea

https://access.redhat.com/errata/RHSA-2014:1942

Plugin Details

Severity: Medium

ID: 234425

File Name: redhat-RHSA-2014-1942.nasl

Version: 1.1

Type: local

Agent: unix

Published: 4/15/2025

Updated: 4/15/2025

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

Vendor

Vendor Severity: Moderate

CVSS v2

Risk Factor: Medium

Base Score: 4

Temporal Score: 3

Vector: CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:P

CVSS Score Source: CVE-2014-7821

CVSS v3

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 5.7

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:openstack-neutron-vmware, p-cpe:/a:redhat:enterprise_linux:python-neutron, p-cpe:/a:redhat:enterprise_linux:openstack-neutron-openvswitch, p-cpe:/a:redhat:enterprise_linux:openstack-neutron-ryu, p-cpe:/a:redhat:enterprise_linux:openstack-neutron-mellanox, p-cpe:/a:redhat:enterprise_linux:openstack-neutron-vpn-agent, p-cpe:/a:redhat:enterprise_linux:openstack-neutron-embrane, p-cpe:/a:redhat:enterprise_linux:openstack-neutron-nec, p-cpe:/a:redhat:enterprise_linux:openstack-neutron-linuxbridge, p-cpe:/a:redhat:enterprise_linux:openstack-neutron-metering-agent, p-cpe:/a:redhat:enterprise_linux:openstack-neutron-midonet, p-cpe:/a:redhat:enterprise_linux:openstack-neutron-nuage, p-cpe:/a:redhat:enterprise_linux:openstack-neutron-oneconvergence-nvsd, p-cpe:/a:redhat:enterprise_linux:openstack-neutron-cisco, p-cpe:/a:redhat:enterprise_linux:openstack-neutron-ibm, p-cpe:/a:redhat:enterprise_linux:openstack-neutron-ml2, p-cpe:/a:redhat:enterprise_linux:openstack-neutron-plumgrid, p-cpe:/a:redhat:enterprise_linux:openstack-neutron-metaplugin, p-cpe:/a:redhat:enterprise_linux:openstack-neutron-ofagent, p-cpe:/a:redhat:enterprise_linux:openstack-neutron-hyperv, p-cpe:/a:redhat:enterprise_linux:openstack-neutron, cpe:/o:redhat:enterprise_linux:7, p-cpe:/a:redhat:enterprise_linux:openstack-neutron-brocade, p-cpe:/a:redhat:enterprise_linux:openstack-neutron-bigswitch

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 12/2/2014

Vulnerability Publication Date: 10/10/2014

Reference Information

CVE: CVE-2014-7821

CWE: 20

RHSA: 2014:1942