[openstack-announce] [OSSA 2015-012] Neutron L2 agent DoS through incorrect allowed address pairs (CVE-2015-3221)

Tristan Cacqueray tdecacqu at redhat.com
Tue Jun 23 17:08:41 UTC 2015

OSSA-2015-012: Neutron L2 agent DoS through incorrect allowed address pairs

:Date: June 23, 2015
:CVE: CVE-2015-3221

- Neutron: 2014.2 versions through 2014.2.3 and 2015.1.0 version

Darragh O'Reilly from HP reported a vulnerability in Neutron. By
adding an address pair which is rejected as invalid by the ipset tool,
an authenticated user may crash the Neutron L2 agent resulting in a
denial of service attack. Neutron setups using the IPTables firewall
driver are affected.

- https://review.openstack.org/194696 (Juno)
- https://review.openstack.org/194697 (Kilo)
- https://review.openstack.org/194695 (Liberty)

- Darragh O'Reilly from HP (CVE-2015-3221)

- https://launchpad.net/bugs/1461054
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3221

- This fix will be included in future 2014.2.4 (juno) and 2015.1.1 (kilo)
- Zero prefixed address pairs are no longer accepted by the Juno API, users
  need to use and or ::/1 and 8000::/1 instead. The
  fix_zero_length_ip_prefix.py tool is provided to clean ports previously
  configured with a zero prefixed address pair

Tristan Cacqueray
OpenStack Vulnerability Management Team

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 473 bytes
Desc: OpenPGP digital signature
URL: <http://lists.openstack.org/pipermail/openstack-announce/attachments/20150623/dca2648a/attachment.pgp>

More information about the OpenStack-announce mailing list