Moderate: Red Hat OpenStack Platform 16.1.9 (openstack-neutron) security update

Related Vulnerabilities: CVE-2022-3277  

Synopsis

Moderate: Red Hat OpenStack Platform 16.1.9 (openstack-neutron) security update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for openstack-neutron is now available for Red Hat OpenStack
Platform 16.1.9 (Train) for Red Hat Enterprise Linux (RHEL) 8.2.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

Description

OpenStack Networking (neutron) is a virtual network service for OpenStack.
Just as OpenStack Compute (nova) provides an API to dynamically request and
configure virtual servers, OpenStack Networking provides an API to
dynamically request and configure virtual networks. These networks connect
'interfaces' from other OpenStack services (e.g. virtual NICs from Compute
VMs). The OpenStack Networking API supports extensions to provide advanced
network capabilities (e.g. QoS, ACLs, network monitoring, etc.)

Security Fix(es):

  • unrestricted creation of security groups (CVE-2022-3277)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page listed in the References section.

Solution

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat OpenStack for IBM Power 16.1 ppc64le
  • Red Hat OpenStack 16.1 x86_64

Fixes

  • BZ - 2015531 - Nova evacuate fails due to timeout waiting for a network-vif-plugged event for instance
  • BZ - 2023242 - MAC address validation passes on invalid MAC addresses (dropped hex digits) [osp-16.1]
  • BZ - 2024692 - [RFE][OVS] QoS policies implementation with HW offload when OVS metering is not offloaded (max BW, egress)
  • BZ - 2035302 - Concurrent bulk requests make neutron-server use 100% CPU on all the workers
  • BZ - 2041346 - [RHOSP 16.1] set the log priority to log.info in "ensure_device_is_ready" function in ip_lib.py
  • BZ - 2055294 - Allow RBAC on Neutron quotas
  • BZ - 2070629 - Since implementation of uplink_status_propagation, default behavior changed for VF link propagation from auto to disabled
  • BZ - 2077016 - [OSP16.1] HA L3 router/keepalived stability issues (ML2/OVS)
  • BZ - 2078266 - [RCA][OSP16.1] Neutron HA qrouter namespace disappeared and router in inconsistent state in DB
  • BZ - 2129193 - CVE-2022-3277 openstack-neutron: unrestricted creation of security groups
  • BZ - 2129712 - [PerfCI][OVS][16.1] create_and_list_networks scenario fails SLA since puddle RHOS-16.1-RHEL-8-20220804.n.1