[OSSA-2016-009] Security Groups do not prevent MAC and/or IPv4 spoofing in DHCP requests (CVE-2016-5362 and CVE-2016-5363)
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
OpenStack Security Advisory |
Fix Released
|
Undecided
|
Unassigned | ||
neutron |
Fix Released
|
High
|
Kevin Benton | ||
Kilo |
Fix Released
|
Undecided
|
Kevin Benton |
Bug Description
The IptablesFirewal
ipv4_rules += [comment_rule('-p udp -m udp --sport 68 --dport 67 '
is too permissive, it does not enforce the source MAC or IP address. This is the IPv4 case of public bug https:/
If L2population is not used, an instance can spoof the Neutron router's MAC address and cause the switches to learn a MAC move, allowing the instance to intercept other instances traffic potentially belonging to other tenants if this is shared network.
The solution for this is to permit this DHCP traffic only from the instance's IP address and the unspecified IPv4 address 0.0.0.0/32 rather than from an IPv4 source, additionally the source MAC address should be restricted to MAC addresses assigned to the instance's Neutron port.
Changed in neutron: | |
assignee: | Dustin Lundquist (dlundquist) → Kevin Benton (kevinbenton) |
Changed in ossa: | |
status: | Incomplete → Triaged |
Changed in neutron: | |
importance: | Undecided → High |
tags: | added: neutron-proactive-backport-potential |
Changed in ossa: | |
status: | Triaged → In Progress |
summary: |
Security Groups do not prevent MAC and/or IPv4 spoofing in DHCP requests + (CVE-2016-5362 and CVE-2016-5363) |
summary: |
- Security Groups do not prevent MAC and/or IPv4 spoofing in DHCP requests - (CVE-2016-5362 and CVE-2016-5363) + [OSSA-2016-009] Security Groups do not prevent MAC and/or IPv4 spoofing + in DHCP requests (CVE-2016-5362 and CVE-2016-5363) |
Changed in ossa: | |
status: | In Progress → Fix Released |
tags: | removed: neutron-proactive-backport-potential |
Changed in ossa: | |
assignee: | nobody → Vyacheslav Anikeyev (slavik1991) |
Changed in ossa: | |
assignee: | Vyacheslav Anikeyev (slavik1991) → nobody |
Since this report concerns a possible security risk, an incomplete security advisory task has been added while the core security reviewers for the affected project or projects confirm the bug and discuss the scope of any vulnerability along with potential solutions.