[Bug 1813007] Re: [SRU] Unable to install new flows on compute nodes when having broken security group rules
Jeremy Stanley
fungi at yuggoth.org
Fri Mar 29 12:53:58 UTC 2019
Is there a chance anyone's working on backporting
I17ab643abbd2ec21eda4ae1dfb9abf2d4b0657f2 upstream to stable/pike
through stable/rocky? Is the impact roughly similar in nature to
https://security.openstack.org/ossa/OSSA-2019-001.html or can someone
make an attempt at describing a viable exploit scenario so we can draft
an appropriate impact description?
** Tags added: pike-backport-potential queens-backport-potential rocky-
backport-potential
--
You received this bug notification because you are a member of Ubuntu
OpenStack, which is subscribed to neutron in Ubuntu.
https://bugs.launchpad.net/bugs/1813007
Title:
[SRU] Unable to install new flows on compute nodes when having broken
security group rules
Status in Ubuntu Cloud Archive:
In Progress
Status in Ubuntu Cloud Archive pike series:
Fix Committed
Status in Ubuntu Cloud Archive queens series:
In Progress
Status in Ubuntu Cloud Archive rocky series:
In Progress
Status in Ubuntu Cloud Archive stein series:
In Progress
Status in neutron:
Fix Released
Status in OpenStack Security Advisory:
Incomplete
Status in neutron package in Ubuntu:
In Progress
Status in neutron source package in Bionic:
Fix Committed
Status in neutron source package in Cosmic:
Fix Committed
Status in neutron source package in Disco:
In Progress
Bug description:
It appears that we have found that neutron-openvswitch-agent appears to have a bug where two security group rules that have two different port ranges that overlap tied to the same parent security group will cause neutron to not be able to configure networks on the compute nodes where those security groups are present.
Those are the broken security rules: https://pastebin.canonical.com/p/wSy8RSXt85/
Here is the log when we discovered the issue: https://pastebin.canonical.com/p/wvFKjNWydr/
Ubuntu SRU Details
------------------
[Impact]
Neutron openvswitch agent crashes due to creation of two security groups that both use the same remote security group, where the first group doesn't define a port range and the second one does (one is a subset of the other; specifying no port range is the same as a full port range).
[Test case]
See comment #18 below.
[Regression Potential]
The fix is fairly minimal and has landed upstream in master branch. It has therefore passed all unit and function tests that get run in the upstream gate and has been reviewed by upstream neutron core reviewers. This all helps to minimize the regression potential.
To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-archive/+bug/1813007/+subscriptions
More information about the Ubuntu-openstack-bugs
mailing list