[Bug 1813007] Re: [SRU] Unable to install new flows on compute nodes when having broken security group rules
Jeremy Stanley
fungi at yuggoth.org
Wed Apr 3 22:08:15 UTC 2019
Thanks for the heads up, Joshua!
The OpenStack VMT is, in turn, waiting for the reporter, Neutron
reviewers or, well, anybody really to clarify the impact of this bug and
indicate whether a fix will be implemented in stable branches (per my
comment #35).
--
You received this bug notification because you are a member of Ubuntu
OpenStack, which is subscribed to neutron in Ubuntu.
https://bugs.launchpad.net/bugs/1813007
Title:
[SRU] Unable to install new flows on compute nodes when having broken
security group rules
Status in Ubuntu Cloud Archive:
Fix Released
Status in Ubuntu Cloud Archive pike series:
Fix Committed
Status in Ubuntu Cloud Archive queens series:
Fix Committed
Status in Ubuntu Cloud Archive rocky series:
Fix Committed
Status in Ubuntu Cloud Archive stein series:
Fix Released
Status in neutron:
Fix Released
Status in OpenStack Security Advisory:
Incomplete
Status in neutron package in Ubuntu:
Fix Committed
Status in neutron source package in Bionic:
Fix Committed
Status in neutron source package in Cosmic:
Fix Committed
Status in neutron source package in Disco:
Fix Committed
Bug description:
It appears that we have found that neutron-openvswitch-agent appears to have a bug where two security group rules that have two different port ranges that overlap tied to the same parent security group will cause neutron to not be able to configure networks on the compute nodes where those security groups are present.
Those are the broken security rules: https://pastebin.canonical.com/p/wSy8RSXt85/
Here is the log when we discovered the issue: https://pastebin.canonical.com/p/wvFKjNWydr/
Ubuntu SRU Details
------------------
[Impact]
Neutron openvswitch agent crashes due to creation of two security groups that both use the same remote security group, where the first group doesn't define a port range and the second one does (one is a subset of the other; specifying no port range is the same as a full port range).
[Test case]
See comment #18 below.
[Regression Potential]
The fix is fairly minimal and has landed upstream in master branch. It has therefore passed all unit and function tests that get run in the upstream gate and has been reviewed by upstream neutron core reviewers. This all helps to minimize the regression potential.
To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-archive/+bug/1813007/+subscriptions
More information about the Ubuntu-openstack-bugs
mailing list