Name | CVE-2015-3221 |
Description | OpenStack Neutron before 2014.2.4 (juno) and 2015.1.x before 2015.1.1 (kilo), when using the IPTables firewall driver, allows remote authenticated users to cause a denial of service (L2 agent crash) by adding an address pair that is rejected by the ipset tool. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 789713 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
neutron (PTS) | jessie | 2014.1.3-12 | fixed |
| stretch (security), stretch (lts), stretch | 2:9.1.1-3+deb9u3 | fixed |
| buster (security), buster, buster (lts) | 2:13.0.7+git.2021.09.27.bace3d1890-0+deb10u1 | fixed |
| bullseye (security), bullseye | 2:17.2.1-0+deb11u1 | fixed |
| bookworm | 2:21.0.0-7 | fixed |
| sid, trixie | 2:25.0.0-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
neutron | source | jessie | (not affected) | | | |
neutron | source | (unstable) | 2015.1.0+2015.06.24.git61.bdf194a0e1-1 | | | 789713 |
Notes
[jessie] - neutron <not-affected> (ipset code introduced in Juno)
https://bugs.launchpad.net/neutron/+bug/1461054/comments/18
2014.2 versions through 2014.2.3 and 2015.1.0 version