SUSE-SU-2014:1034-1: moderate: Security update for openstack-neutron

sle-updates at lists.suse.com sle-updates at lists.suse.com
Mon Aug 18 17:04:21 MDT 2014


   SUSE Security Update: Security update for openstack-neutron
______________________________________________________________________________

Announcement ID:    SUSE-SU-2014:1034-1
Rating:             moderate
References:         #887348 
Cross-References:   CVE-2014-3555
Affected Products:
                    SUSE Cloud 3
______________________________________________________________________________

   An update that fixes one vulnerability is now available. It
   includes one version update.

Description:


   OpenStack Neutron has been updated to fix bugs and security issues:

   Security issue fixed:

       * CVE-2014-3555: openstack-neutron: Denial of Service in Neutron
         allowed address pair

   Bug Fixes and Enhancements:

       * Fixed dhcp & gateway ip conflict in PLUMgrid plug-in
       * Updated from global requirements
       * Ensure routing key is specified in the address for a direct producer
       * Improve handling of security group updates
       * Ensure that session is rolled back on bulk creates
       * Allow multiple DNS forwarders for dnsmasq
       * Fix get_vif_port_by_id to only return relevant ports
       * Remove explicit dependency on amqplib
       * LBaaS add missing rootwrap filter for route
       * NVP plugin:fix delete sec group when backend is out of sync
       * Kill 'Skipping unknown group key: firewall_driver' log trace
       * Added missing plugin .ini files to setup.cfg
       * OVS lib defer apply doesn't handle concurrency
       * Fixed floating IP logic in PLUMgrid plug-in
       * tests/unit: Initialize core plugin in TestL3GwModeMixin
       * Install SNAT rules for ipv4 only
       * Optionally delete name spaces when they are no longer needed
       * l2-population : send flooding entries when the last port goes down
       * l2-population/lb/vxlan : ip neigh add command failed
       * Fixes the Hyper-V agent individual ports metrics
       * Call policy.init() once per API request
       * Call _destroy_metadata_proxy from _destroy_router_name spaces
       * ml2: gre, vxlan type driver can leak segment_id

   Security Issues:

       * CVE-2014-3555
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3555>


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Cloud 3:

      zypper in -t patch sleclo30sp3-openstack-neutron-9567

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Cloud 3 (x86_64) [New Version: 2013.2.4.dev93.gf569afd]:

      openstack-neutron-2013.2.4.dev93.gf569afd-0.7.1
      openstack-neutron-dhcp-agent-2013.2.4.dev93.gf569afd-0.7.1
      openstack-neutron-ha-tool-2013.2.4.dev93.gf569afd-0.7.1
      openstack-neutron-l3-agent-2013.2.4.dev93.gf569afd-0.7.1
      openstack-neutron-lbaas-agent-2013.2.4.dev93.gf569afd-0.7.1
      openstack-neutron-linuxbridge-agent-2013.2.4.dev93.gf569afd-0.7.1
      openstack-neutron-metadata-agent-2013.2.4.dev93.gf569afd-0.7.1
      openstack-neutron-metering-agent-2013.2.4.dev93.gf569afd-0.7.1
      openstack-neutron-mlnx-agent-2013.2.4.dev93.gf569afd-0.7.1
      openstack-neutron-nec-agent-2013.2.4.dev93.gf569afd-0.7.1
      openstack-neutron-openvswitch-agent-2013.2.4.dev93.gf569afd-0.7.1
      openstack-neutron-plugin-cisco-2013.2.4.dev93.gf569afd-0.7.1
      openstack-neutron-ryu-agent-2013.2.4.dev93.gf569afd-0.7.1
      openstack-neutron-server-2013.2.4.dev93.gf569afd-0.7.1
      openstack-neutron-vmware-agent-2013.2.4.dev93.gf569afd-0.7.1
      openstack-neutron-vpn-agent-2013.2.4.dev93.gf569afd-0.7.1
      python-neutron-2013.2.4.dev93.gf569afd-0.7.1

   - SUSE Cloud 3 (noarch) [New Version: 2013.2.4.dev93.gf569afd]:

      openstack-neutron-doc-2013.2.4.dev93.gf569afd-0.7.1


References:

   http://support.novell.com/security/cve/CVE-2014-3555.html
   https://bugzilla.novell.com/887348
   http://download.suse.com/patch/finder/?keywords=82fb0da16541b6f979190147212a9a2f



More information about the sle-updates mailing list