adding 0.0.0.0/0 address pair to a port bypasses all other vm security groups
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
OpenStack Security Advisory |
Won't Fix
|
Undecided
|
Unassigned | ||
OpenStack Security Notes |
New
|
Undecided
|
Unassigned | ||
neutron |
Fix Released
|
Low
|
Brian Haley |
Bug Description
On an openstack-ansible / newton setup with linuxbridge, a customer ran:
neutron port-update $port-uuid --allowed-
to bypass the ip source restriction (pfsense router and had to route packets).
The impact of running the above, was an allow all rule was added to all ports in the network, bypassing all security groups.
The iptables rule:
905K 55M RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 match-set NIPv44046d62c-
used on all ports, now triggers as:
0.0.0.0/1
128.0.0.0/1
was added to the ipset NIPv44046d62c-
Expected result was to remove ip filtering on the single port.
This sounds similar to:
https:/
but is marked fixed long ago.
I've marked this as a security bug as a change to a single port can bypass other ports security groups.
Changed in neutron: | |
assignee: | Slawek Kaplonski (slaweq) → Brian Haley (brian-haley) |
Since this report concerns a possible security risk, an incomplete security advisory task has been added while the core security reviewers for the affected project or projects confirm the bug and discuss the scope of any vulnerability along with potential solutions.