[Openstack] [OSSA 2015-018] Neutron firewall rules bypass through port update (CVE-2015-5240)

Tristan Cacqueray tdecacqu at redhat.com
Tue Sep 8 23:42:38 UTC 2015


================================================================
OSSA-2015-018: Neutron firewall rules bypass through port update
================================================================

:Date: September 08, 2015
:CVE: CVE-2015-5240


Affects
~~~~~~~
- Neutron: versions through 2014.2.3 and
           2015.1 versions through 2015.1.1


Description
~~~~~~~~~~~
Kevin Benton from Mirantis reported a vulnerability in Neutron. By
changing the device owner of an instance's port right after it is
created, an authenticated user may prevent application of firewall
rules and so avoid IP anti-spoofing controls. All Neutron setups using
the ML2 plugin or a plugin that relies on the security groups AMQP API
are affected.


Patches
~~~~~~~
- https://review.openstack.org/221345 (Juno)
- https://review.openstack.org/221344 (Kilo)
- https://review.openstack.org/221342 (Liberty)


Credits
~~~~~~~
- Kevin Benton from Mirantis (CVE-2015-5240)


References
~~~~~~~~~~
- https://launchpad.net/bugs/1489111
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5240


Notes
~~~~~
- This fix will be included in future 2014.2.4 (juno) and
  2015.1.2 (kilo) releases.

--
Tristan Cacqueray
OpenStack Vulnerability Management Team

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 473 bytes
Desc: OpenPGP digital signature
URL: <http://lists.openstack.org/pipermail/openstack/attachments/20150908/de7365a0/attachment.sig>


More information about the Openstack mailing list