CVE-2015-3221

NameCVE-2015-3221
DescriptionOpenStack Neutron before 2014.2.4 (juno) and 2015.1.x before 2015.1.1 (kilo), when using the IPTables firewall driver, allows remote authenticated users to cause a denial of service (L2 agent crash) by adding an address pair that is rejected by the ipset tool.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium (attack range: remote)
Debian Bugs789713

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
neutron (PTS)jessie2014.1.3-12fixed
stretch2:9.1.1-3fixed
buster, sid2:13.0.2-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
neutronsource(unstable)2015.1.0+2015.06.24.git61.bdf194a0e1-1medium789713
neutronsourcejessie(not affected)

Notes

[jessie] - neutron <not-affected> (ipset code introduced in Juno)
https://bugs.launchpad.net/neutron/+bug/1461054/comments/18
2014.2 versions through 2014.2.3 and 2015.1.0 version

Search for package or bug name: Reporting problems