[OSSA 2015-012] Adding 0.0.0.0/0 to allowed address pairs breaks l2 agent (CVE-2015-3221)
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
OpenStack Security Advisory |
Fix Released
|
Critical
|
Tristan Cacqueray | ||
neutron |
Fix Released
|
Critical
|
Aaron Rosen | ||
Juno |
Fix Released
|
Critical
|
Tristan Cacqueray | ||
Kilo |
Fix Committed
|
Critical
|
Tristan Cacqueray |
Bug Description
vagrant@node1:~$ neutron port-update $PORT_ID --allowed_
Updated port: 28dc7eb1-
This does not work - the ipset man page says that zero prefix size is not allowed for type hash:net.
But it also breaks the l2 agent and so affects other ports/vms/tenants ... - so opening as security vulnerability.
2015-06-02 11:02:31.897 ERROR neutron.
Command: ['ipset', 'add', '-exist', u'NETIPv48a4459
Exit code: 1
Stdin:
Stdout:
Stderr: ipset v6.20.1: The value of the CIDR parameter of the IP address is invalid
2015-06-02 11:02:31.898 DEBUG oslo_concurrenc
2015-06-02 11:02:31.898 DEBUG oslo_concurrenc
2015-06-02 11:02:31.898 ERROR neutron.
2015-06-02 11:02:31.898 3679 TRACE neutron.
2015-06-02 11:02:31.898 3679 TRACE neutron.
2015-06-02 11:02:31.898 3679 TRACE neutron.
2015-06-02 11:02:31.898 3679 TRACE neutron.
2015-06-02 11:02:31.898 3679 TRACE neutron.
2015-06-02 11:02:31.898 3679 TRACE neutron.
2015-06-02 11:02:31.898 3679 TRACE neutron.
2015-06-02 11:02:31.898 3679 TRACE neutron.
2015-06-02 11:02:31.898 3679 TRACE neutron.
2015-06-02 11:02:31.898 3679 TRACE neutron.
2015-06-02 11:02:31.898 3679 TRACE neutron.
2015-06-02 11:02:31.898 3679 TRACE neutron.
2015-06-02 11:02:31.898 3679 TRACE neutron.
2015-06-02 11:02:31.898 3679 TRACE neutron.
2015-06-02 11:02:31.898 3679 TRACE neutron.
2015-06-02 11:02:31.898 3679 TRACE neutron.
2015-06-02 11:02:31.898 3679 TRACE neutron.
2015-06-02 11:02:31.898 3679 TRACE neutron.
2015-06-02 11:02:31.898 3679 TRACE neutron.
2015-06-02 11:02:31.898 3679 TRACE neutron.
2015-06-02 11:02:31.898 3679 TRACE neutron.
2015-06-02 11:02:31.898 3679 TRACE neutron.
2015-06-02 11:02:31.898 3679 TRACE neutron.
2015-06-02 11:02:31.898 3679 TRACE neutron.
vagrant@node1:~$
vagrant@node1:~$ tail /opt/stack/
2015-06-02 11:19:50.208 3679 TRACE neutron.
2015-06-02 11:19:50.208 3679 TRACE neutron.
2015-06-02 11:19:50.208 3679 TRACE neutron.
2015-06-02 11:19:50.208 3679 TRACE neutron.
2015-06-02 11:19:50.208 3679 TRACE neutron.
2015-06-02 11:19:50.208 3679 TRACE neutron.
2015-06-02 11:19:50.208 3679 TRACE neutron.
2015-06-02 11:19:50.208 3679 TRACE neutron.
2015-06-02 11:19:50.208 3679 TRACE neutron.
2015-06-02 11:19:50.208 3679 TRACE neutron.
Workaround:
neutron port-update $PORT_ID --allowed_
CVE References
description: | updated |
description: | updated |
Changed in ossa: | |
status: | Incomplete → Confirmed |
importance: | Undecided → Critical |
Changed in ossa: | |
status: | Triaged → In Progress |
assignee: | nobody → Tristan Cacqueray (tristan-cacqueray) |
summary: |
Adding 0.0.0.0/0 to allowed address pairs breaks l2 agent + (CVE-2015-3221) |
Changed in ossa: | |
status: | In Progress → Fix Committed |
information type: | Private Security → Public Security |
summary: |
- Adding 0.0.0.0/0 to allowed address pairs breaks l2 agent - (CVE-2015-3221) + [OSSA 2015-012] Adding 0.0.0.0/0 to allowed address pairs breaks l2 + agent (CVE-2015-3221) |
Changed in neutron: | |
assignee: | Tristan Cacqueray (tristan-cacqueray) → Aaron Rosen (arosen) |
Changed in neutron: | |
status: | In Progress → Fix Committed |
tags: | added: 6.1-mu-1 |
Changed in ossa: | |
status: | Fix Committed → Fix Released |
description: | updated |
Changed in neutron: | |
milestone: | none → liberty-2 |
status: | Fix Committed → Fix Released |
Changed in neutron: | |
milestone: | liberty-2 → 7.0.0 |
Since this report concerns a possible security risk, an incomplete security advisory task has been added while the core security reviewers for the affected project or projects confirm the bug and discuss the scope of any vulnerability along with potential solutions.