First published: Wed Feb 12 2014(Updated: )
Yair Fried of Red Hat reports: A regression from Grizzly and Havana exists in the PackStack rules deployed to Neutron. Specifically when default security groups are enabled they are not enforced, allowing connectivity to systems that should be blocked by the security groups. External references: <a href="https://review.openstack.org/#/c/62702/">https://review.openstack.org/#/c/62702/</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Packstack | ||
OpenStack Neutron |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1064163 is classified as a high-risk vulnerability due to the potential exposure of systems to unwanted connectivity.
To mitigate REDHAT-BUG-1064163, ensure that security group settings are correctly configured and enforced within your OpenStack Neutron deployment.
The systems affected by REDHAT-BUG-1064163 include Red Hat PackStack and OpenStack Neutron.
Yes, REDHAT-BUG-1064163 can lead to unauthorized access as it allows connectivity that should be restricted by default security groups.
A temporary workaround for REDHAT-BUG-1064163 is to manually enforce security group rules until an official patch is applied.