Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2014:0091 - Security Advisory
Issued:
2014-01-22
Updated:
2014-01-22

RHSA-2014:0091 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: openstack-neutron security, bug fix, and enhancement update

Type/Severity

Security Advisory: Moderate

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated openstack-neutron packages that fix one security issue, several
bugs, and add various enhancements are now available for Red Hat Enterprise
Linux OpenStack Platform 4.0.

The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

Description

The openstack-neutron packages provide Openstack Networking (neutron), the
virtual network service.

It was discovered that the metadata agent in OpenStack Networking was
missing an authorization check on the device ID that is bound to a specific
port. A remote tenant could guess the instance ID bound to a port and
retrieve metadata of another tenant, resulting in information disclosure.
Note that only OpenStack Networking setups running neutron-metadata-agent
were affected. (CVE-2013-6419)

Red Hat would like to thank Jeremy Stanley of the OpenStack Project for
reporting this issue. Upstream acknowledges Aaron Rosen of VMware as the
original reporter.

The openstack-neutron packages have been upgraded to upstream version
2013.2.1, which provides a number of bug fixes and enhancements over the
previous version. The most notable fixes and enhancements are:

  • Support for multiple workers in the Neutron API. This can be achieved by

setting the 'workers=' parameter in the neutron.conf file.

  • The downtime and report interval default settings are tuned for

neutron agents.

  • The floating IP address stability has been enhanced.
  • A heartbeat-related deadlock problem in neutron-server has been fixed.

(BZ#1045419)

This update also fixes the following bugs:

  • An incorrect warning was displayed when running neutron-dhcp-agent with

Red Hat Enterprise Linux's version of dnsmasq. This meant that users were
incorrectly warned that Red Hat Enterprise Linux's dnsmasq version will not
work with neutron-dhcp-agent. This warning has been removed, and will no
longer be logged to the neutron-dhcp-agent log file. (BZ#1040196)

  • A bug in the QPID topic consumer re-connection logic (under the v2

topology) caused qpidd to use a malformed subscriber address after
restarting, resulting in RPC requests sent to a topic with multiple servers
ending up being incorrectly multicast to all servers. This update removes
the special-case reconnect logic that handles UUID addresses, which in turn
avoids the incorrect establishment of multiple subscription to the same
fanout address. The QPID broker now simply automatically generates unique
queue names when clients reconnect. (BZ#1045067)

  • Thread-consuming QPID messages were killed silently by unhandled errors,

thus resulting in isolating the component from the rest of the system.
With this update, consuming threads are made more resilient to errors by
ensuring they do not die on an unhandled error. The error is now logged,
and the consuming thread is retried. (BZ#1054249)

In addition, this update adds the following enhancement:

  • Previously, instances connected to tenant networks gained outside

connectivity by going through an SNAT by the L3 agent hosting that
network's virtual router. With this release, the ability to disable
SNAT/PAT on virtual servers is added ensuring that an instance in a tenant
network subnet will retain its IP address as it passes through external
networks. For example, if 10.0.0.1 is an instance in the 10.0.0.0/8 tenant
network, R1, a virtual router that connects the 10.0.0.0/8 subnet to the
20.0.0.0/8 public provider networks, then you can use the 'neutron
router-gateway-set --disable-snat R1 public' command and any traffic from
10.0.0.1, which is forwarded out to the provider network, will retain its
actual source IP address of 10.0.0.1. This can be a flexible and useful
method to connect instances directly to a provider network, while retaining
it in a tenant network. (BZ#1046070)

All openstack-neutron users are advised to upgrade to these updated
packages, which correct these issues and add these enhancements.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258

Affected Products

  • Red Hat OpenStack 4.0 x86_64

Fixes

  • BZ - 1038737 - neutron is creating duplicated NAT rules, resulting in instances without network connection
  • BZ - 1039148 - CVE-2013-6419 OpenStack Neutron and Nova: Metadata queries from Neutron to Nova are not restricted by tenant
  • BZ - 1039528 - Neutron rootwrap does not follow packaging guidelines
  • BZ - 1040196 - Remove dnsmasq version warning for dhcp-agent on RHEL
  • BZ - 1045067 - [oslo] With QPID, RPC calls to a topic are always fanned-out to all subscribers.
  • BZ - 1046070 - Configurable External Gateway Modes
  • BZ - 1046087 - The error message that indicates manual DB stamping is needed is not clear enough
  • BZ - 1054249 - Thread consuming qpid messages can die silently

CVEs

  • CVE-2013-6419

References

  • https://access.redhat.com/security/updates/classification/#moderate
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat OpenStack 4.0

SRPM
openstack-neutron-2013.2.1-4.el6ost.src.rpm SHA-256: 39f4d5e85e78903cf4add2bb966245f6cb96c44d767e3edc4d68b82e61eae686
x86_64
openstack-neutron-2013.2.1-4.el6ost.noarch.rpm SHA-256: 89f234c1efe802fb0d01ef1b62058b387d12b1f09bf4b22828426dd682117d42
openstack-neutron-bigswitch-2013.2.1-4.el6ost.noarch.rpm SHA-256: 4fd11613c0a8bf93e1c2ec71db2b9531f6e5be9cc90b4d8c3beb4c02e86c8e1a
openstack-neutron-brocade-2013.2.1-4.el6ost.noarch.rpm SHA-256: d4769466a64ac53f68ebc35b340349eb74777dc77c6a2c6033622590a0e725a4
openstack-neutron-cisco-2013.2.1-4.el6ost.noarch.rpm SHA-256: ceee914a35eb15a884be2753967a6d5e77e4e3ed33a60036e11a30b09809c75e
openstack-neutron-hyperv-2013.2.1-4.el6ost.noarch.rpm SHA-256: 39406c2269403abb929fa5e21492a1e028027bbddf334795f37f3ea63eeb7c99
openstack-neutron-linuxbridge-2013.2.1-4.el6ost.noarch.rpm SHA-256: 69e858082dda3ac1dd5011f60e0161a6ebd5d65f87404a7ab59714b6dcd68290
openstack-neutron-mellanox-2013.2.1-4.el6ost.noarch.rpm SHA-256: a136ad361b42ae89c345bd511b31ba825e30b96bd637061db45b4afda1eb10b3
openstack-neutron-metaplugin-2013.2.1-4.el6ost.noarch.rpm SHA-256: 22f21f464cdd32ad46e4277028ee937cfbd67c6408a208dea2e348f1b1df948a
openstack-neutron-metering-agent-2013.2.1-4.el6ost.noarch.rpm SHA-256: b3494f319338543fbe8c2476c4a055b7ee46e70882c56bb0c4f6da685762bafd
openstack-neutron-midonet-2013.2.1-4.el6ost.noarch.rpm SHA-256: dc641f397cd2802fe867ddd487095aba08f8186a1dc88f7aa6625f6e7bddb546
openstack-neutron-ml2-2013.2.1-4.el6ost.noarch.rpm SHA-256: a7eb218215150b27847747c694eda778b0d9beb6f467fb670415f63767e8572f
openstack-neutron-nec-2013.2.1-4.el6ost.noarch.rpm SHA-256: 6548c90b210215dcec7b31abe59270d0084782dbb736c1abf6218a6d7bc44626
openstack-neutron-nicira-2013.2.1-4.el6ost.noarch.rpm SHA-256: b8f690e0d4cd3a5290e052c623a4f2fc028b1e98a3b05fab5a81203f3f957974
openstack-neutron-openvswitch-2013.2.1-4.el6ost.noarch.rpm SHA-256: 3d0adfb6402eb526bc8cf28cff3b0604e3cd22ecdab372858a92ceda40303055
openstack-neutron-plumgrid-2013.2.1-4.el6ost.noarch.rpm SHA-256: a4ad2570a66a88158910d1808a7d35c90fb630ce2405db227e7a164cf13ab704
openstack-neutron-ryu-2013.2.1-4.el6ost.noarch.rpm SHA-256: 4b0f80570501c3e46ab5317d506a1ca2ee5f196c2cffef0b83db59ca27a3b357
openstack-neutron-vpn-agent-2013.2.1-4.el6ost.noarch.rpm SHA-256: a59d18960bddaf717e58eda1c11ecf306622a9aa1f4e2cfa1c25fac54602e47e
python-neutron-2013.2.1-4.el6ost.noarch.rpm SHA-256: f087f7421a58d25879fac325326f7fd106c782780c38bd5278e629e739148734

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility