Activity log for bug #1489111

Date Who What changed Old value New value Message
2015-08-26 18:15:19 Kevin Benton bug added bug
2015-08-26 18:18:43 Kevin Benton attachment added devowner_patch.patch https://bugs.launchpad.net/neutron/+bug/1489111/+attachment/4452864/+files/devowner_patch.patch
2015-08-26 18:35:11 Tristan Cacqueray bug task added ossa
2015-08-26 18:35:16 Tristan Cacqueray ossa: status New Incomplete
2015-08-26 18:35:27 Tristan Cacqueray bug added subscriber Neutron Core Security reviewers
2015-08-26 18:36:07 Tristan Cacqueray description The anti-IP spoofing rules, anti-MAC spoofing rules, and anti-DHCP spoofing rules can be bypassed by changing the device_owner field of a compute node's port to something that starts with 'network:'. Steps to reproduce: Create a port on the target network: neutron port-create some_network Start a repeated update of the device_owner field to immediately change it back after nova sets it to 'compute:<whatever>' on VM attachment. (This has to be done quickly because the owner has to be set to 'network:something' before the L2 agent wires up the security group rules.) watch neutron port-update <port-uuid-from-above> --device-owner network:hello Then boot the VM with the port UUID: nova boot test --nic port-id=<port-uuid-from-above> --flavor m1.tiny --image cirros-0.3.4-x86_64-uec This VM will now have no iptables rules applied because it will be treated as a network owned port (e.g. router interface, DHCP interface, etc). This issue is being treated as a potential security risk under embargo. Please do not make any public mention of embargoed (private) security vulnerabilities before their coordinated publication by the OpenStack Vulnerability Management Team in the form of an official OpenStack Security Advisory. This includes discussion of the bug or associated fixes in public forums such as mailing lists, code review systems and bug trackers. Please also avoid private disclosure to other individuals not already approved for access to this information, and provide this same reminder to those who are made aware of the issue prior to publication. All discussion should remain confined to this private bug report, and any proposed fixes should be added to the bug as attachments. -- The anti-IP spoofing rules, anti-MAC spoofing rules, and anti-DHCP spoofing rules can be bypassed by changing the device_owner field of a compute node's port to something that starts with 'network:'. Steps to reproduce: Create a port on the target network: neutron port-create some_network Start a repeated update of the device_owner field to immediately change it back after nova sets it to 'compute:<whatever>' on VM attachment. (This has to be done quickly because the owner has to be set to 'network:something' before the L2 agent wires up the security group rules.) watch neutron port-update <port-uuid-from-above> --device-owner network:hello Then boot the VM with the port UUID: nova boot test --nic port-id=<port-uuid-from-above> --flavor m1.tiny --image cirros-0.3.4-x86_64-uec This VM will now have no iptables rules applied because it will be treated as a network owned port (e.g. router interface, DHCP interface, etc).
2015-08-26 18:48:32 Kevin Benton attachment removed devowner_patch.patch https://bugs.launchpad.net/neutron/+bug/1489111/+attachment/4452864/+files/devowner_patch.patch
2015-08-26 18:50:24 Kevin Benton attachment added devowner_patch.patch https://bugs.launchpad.net/neutron/+bug/1489111/+attachment/4452884/+files/devowner_patch.patch
2015-08-26 20:38:31 Tristan Cacqueray ossa: status Incomplete Confirmed
2015-08-26 20:38:43 Tristan Cacqueray ossa: assignee Tristan Cacqueray (tristan-cacqueray)
2015-08-26 21:10:59 Kevin Benton attachment added devowner_patch.patch https://bugs.launchpad.net/neutron/+bug/1489111/+attachment/4452943/+files/devowner_patch.patch
2015-08-26 21:11:10 Kevin Benton attachment removed devowner_patch.patch https://bugs.launchpad.net/neutron/+bug/1489111/+attachment/4452884/+files/devowner_patch.patch
2015-08-27 13:12:38 Tristan Cacqueray ossa: status Confirmed Triaged
2015-08-27 19:25:55 Kevin Benton attachment added kilo patch https://bugs.launchpad.net/neutron/+bug/1489111/+attachment/4453491/+files/devowner_patch_kilo.patch
2015-08-27 19:26:16 Kevin Benton attachment added juno patch https://bugs.launchpad.net/neutron/+bug/1489111/+attachment/4453492/+files/devowner_patch_juno.patch
2015-08-27 20:01:56 Tristan Cacqueray ossa: status Triaged In Progress
2015-08-27 20:26:35 Tristan Cacqueray cve linked 2015-5240
2015-08-27 20:26:47 Tristan Cacqueray summary IP, MAC, and DHCP spoofing rules can by bypassed by changing device_owner IP, MAC, and DHCP spoofing rules can by bypassed by changing device_owner (CVE-2015-5240)
2015-08-28 14:48:25 Tristan Cacqueray ossa: status In Progress Fix Committed
2015-09-01 20:02:16 Kevin Benton attachment removed kilo patch https://bugs.launchpad.net/neutron/+bug/1489111/+attachment/4453491/+files/devowner_patch_kilo.patch
2015-09-01 20:36:16 Kevin Benton attachment removed devowner_patch.patch https://bugs.launchpad.net/neutron/+bug/1489111/+attachment/4452943/+files/devowner_patch.patch
2015-09-01 20:36:30 Kevin Benton attachment removed juno patch https://bugs.launchpad.net/neutron/+bug/1489111/+attachment/4453492/+files/devowner_patch_juno.patch
2015-09-01 20:42:23 Kevin Benton attachment added juno patch https://bugs.launchpad.net/neutron/+bug/1489111/+attachment/4455836/+files/devowner_patch_juno.patch
2015-09-01 20:46:13 Kevin Benton attachment removed juno patch https://bugs.launchpad.net/neutron/+bug/1489111/+attachment/4455836/+files/devowner_patch_juno.patch
2015-09-01 20:58:13 Kevin Benton attachment added master patch https://bugs.launchpad.net/neutron/+bug/1489111/+attachment/4455837/+files/devowner_patch.patch
2015-09-01 21:00:18 Kevin Benton attachment added kilo patch https://bugs.launchpad.net/neutron/+bug/1489111/+attachment/4455838/+files/devowner_patch_kilo.patch
2015-09-01 21:06:20 Kevin Benton attachment added juno patch https://bugs.launchpad.net/neutron/+bug/1489111/+attachment/4455839/+files/devowner_patch_juno.patch
2015-09-08 14:59:53 Tristan Cacqueray information type Private Security Public Security
2015-09-08 15:00:22 OpenStack Infra neutron: status New In Progress
2015-09-08 15:00:22 OpenStack Infra neutron: assignee Tristan Cacqueray (tristan-cacqueray)
2015-09-08 15:02:38 Tristan Cacqueray summary IP, MAC, and DHCP spoofing rules can by bypassed by changing device_owner (CVE-2015-5240) [OSSA 2015-018] IP, MAC, and DHCP spoofing rules can by bypassed by changing device_owner (CVE-2015-5240)
2015-09-08 22:40:32 OpenStack Infra neutron: status In Progress Fix Committed
2015-09-09 02:29:30 OpenStack Infra tags in-stable-juno
2015-09-09 02:32:26 OpenStack Infra tags in-stable-juno in-stable-juno in-stable-kilo
2015-09-14 14:04:09 Tristan Cacqueray ossa: status Fix Committed Fix Released
2015-09-17 22:36:51 OpenStack Infra tags in-stable-juno in-stable-kilo in-feature-pecan in-stable-juno in-stable-kilo
2015-09-24 07:31:04 Thierry Carrez neutron: status Fix Committed Fix Released
2015-09-24 07:31:04 Thierry Carrez neutron: milestone liberty-rc1
2015-10-15 12:39:45 Thierry Carrez neutron: milestone liberty-rc1 7.0.0
2015-11-02 11:40:07 Timur Nurlygayanov bug added subscriber Kristina Kuznetsova
2015-11-14 10:34:11 Alan Pevec nominated for series neutron/juno
2015-11-14 10:34:11 Alan Pevec bug task added neutron/juno
2015-11-14 15:07:12 Alan Pevec neutron/juno: status New Fix Committed
2015-11-14 15:07:12 Alan Pevec neutron/juno: milestone 2014.2.4
2015-11-19 21:45:24 Alan Pevec neutron/juno: status Fix Committed Fix Released
2015-11-25 13:15:13 Tristan Cacqueray description This issue is being treated as a potential security risk under embargo. Please do not make any public mention of embargoed (private) security vulnerabilities before their coordinated publication by the OpenStack Vulnerability Management Team in the form of an official OpenStack Security Advisory. This includes discussion of the bug or associated fixes in public forums such as mailing lists, code review systems and bug trackers. Please also avoid private disclosure to other individuals not already approved for access to this information, and provide this same reminder to those who are made aware of the issue prior to publication. All discussion should remain confined to this private bug report, and any proposed fixes should be added to the bug as attachments. -- The anti-IP spoofing rules, anti-MAC spoofing rules, and anti-DHCP spoofing rules can be bypassed by changing the device_owner field of a compute node's port to something that starts with 'network:'. Steps to reproduce: Create a port on the target network: neutron port-create some_network Start a repeated update of the device_owner field to immediately change it back after nova sets it to 'compute:<whatever>' on VM attachment. (This has to be done quickly because the owner has to be set to 'network:something' before the L2 agent wires up the security group rules.) watch neutron port-update <port-uuid-from-above> --device-owner network:hello Then boot the VM with the port UUID: nova boot test --nic port-id=<port-uuid-from-above> --flavor m1.tiny --image cirros-0.3.4-x86_64-uec This VM will now have no iptables rules applied because it will be treated as a network owned port (e.g. router interface, DHCP interface, etc). The anti-IP spoofing rules, anti-MAC spoofing rules, and anti-DHCP spoofing rules can be bypassed by changing the device_owner field of a compute node's port to something that starts with 'network:'. Steps to reproduce: Create a port on the target network: neutron port-create some_network Start a repeated update of the device_owner field to immediately change it back after nova sets it to 'compute:<whatever>' on VM attachment. (This has to be done quickly because the owner has to be set to 'network:something' before the L2 agent wires up the security group rules.) watch neutron port-update <port-uuid-from-above> --device-owner network:hello Then boot the VM with the port UUID: nova boot test --nic port-id=<port-uuid-from-above> --flavor m1.tiny --image cirros-0.3.4-x86_64-uec This VM will now have no iptables rules applied because it will be treated as a network owned port (e.g. router interface, DHCP interface, etc).