Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2013-6491
Vulnerability from cvelistv5
Published
2014-02-02 00:00
Modified
2024-08-06 17:46
Severity ?
EPSS score ?
Summary
The python-qpid client (common/rpc/impl_qpid.py) in OpenStack Oslo before 2013.2 does not enforce SSL connections when qpid_protocol is set to ssl, which allows remote attackers to obtain sensitive information by sniffing the network.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T17:46:22.030Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.launchpad.net/oslo/+bug/1158807" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=996766" }, { "name": "USN-2247-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2247-1" }, { "name": "RHSA-2014:0112", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0112.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-01-30T00:00:00", "descriptions": [ { "lang": "en", "value": "The python-qpid client (common/rpc/impl_qpid.py) in OpenStack Oslo before 2013.2 does not enforce SSL connections when qpid_protocol is set to ssl, which allows remote attackers to obtain sensitive information by sniffing the network." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-06-19T14:57:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.launchpad.net/oslo/+bug/1158807" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=996766" }, { "name": "USN-2247-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2247-1" }, { "name": "RHSA-2014:0112", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0112.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-6491", "datePublished": "2014-02-02T00:00:00", "dateReserved": "2013-11-04T00:00:00", "dateUpdated": "2024-08-06T17:46:22.030Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:openstack:oslo:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2013\", \"matchCriteriaId\": \"0146D347-4531-44F8-91FD-C32CBEF9191A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:openstack:3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6533B15B-F748-4A5D-AB86-31D38DFAE60F\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"The python-qpid client (common/rpc/impl_qpid.py) in OpenStack Oslo before 2013.2 does not enforce SSL connections when qpid_protocol is set to ssl, which allows remote attackers to obtain sensitive information by sniffing the network.\"}, {\"lang\": \"es\", \"value\": \"El cliente python-qpid (common/rpc/impl_qpid.py) en OpenStack Oslo anterior a 2013.2 no fuerza conexiones SSL cuando qpid_protocol se establece a ssl, lo cual permite a atacantes remotos obtener informaci\\u00f3n sensible escuchando la red.\"}]", "id": "CVE-2013-6491", "lastModified": "2024-11-21T01:59:19.913", "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:P/I:N/A:N\", \"baseScore\": 4.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", "published": "2014-02-02T00:55:04.647", "references": "[{\"url\": \"http://rhn.redhat.com/errata/RHSA-2014-0112.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.ubuntu.com/usn/USN-2247-1\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://bugs.launchpad.net/oslo/+bug/1158807\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=996766\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2014-0112.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.ubuntu.com/usn/USN-2247-1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://bugs.launchpad.net/oslo/+bug/1158807\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=996766\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]", "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-310\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2013-6491\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2014-02-02T00:55:04.647\",\"lastModified\":\"2024-11-21T01:59:19.913\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The python-qpid client (common/rpc/impl_qpid.py) in OpenStack Oslo before 2013.2 does not enforce SSL connections when qpid_protocol is set to ssl, which allows remote attackers to obtain sensitive information by sniffing the network.\"},{\"lang\":\"es\",\"value\":\"El cliente python-qpid (common/rpc/impl_qpid.py) en OpenStack Oslo anterior a 2013.2 no fuerza conexiones SSL cuando qpid_protocol se establece a ssl, lo cual permite a atacantes remotos obtener informaci\u00f3n sensible escuchando la red.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:N/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-310\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openstack:oslo:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2013\",\"matchCriteriaId\":\"0146D347-4531-44F8-91FD-C32CBEF9191A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openstack:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6533B15B-F748-4A5D-AB86-31D38DFAE60F\"}]}]}],\"references\":[{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-0112.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2247-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugs.launchpad.net/oslo/+bug/1158807\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=996766\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-0112.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2247-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugs.launchpad.net/oslo/+bug/1158807\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=996766\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
rhba-2014:0363
Vulnerability from csaf_redhat
Published
2014-04-03 18:16
Modified
2024-11-22 07:25
Summary
Red Hat Bug Fix Advisory: Red Hat Enterprise Linux OpenStack Platform 3 Bug Fix and Enhancement Advisory
Notes
Topic
Updated packages for Red Hat Enterprise Linux OpenStack Platform 3.0 (Grizzly), which fix bugs and add enhancements, are now available.
Details
Red Hat Enterprise Linux OpenStack Platform provides the facilities for building a private or public infrastructure-as-a-service (IaaS) cloud running on commonly available physical hardware. Services provided by these packages include:
* OpenStack Block Storage service ("cinder").
* OpenStack Compute service ("nova").
* OpenStack Dashboard ("horizon").
* OpenStack Image service ("glance").
* OpenStack Identity ("keystone").
* OpenStack Networking service ("neutron").
* OpenStack Object Storage service ("swift").
* OpenStack Orchestration service ("heat") - Technology Preview.
* OpenStack Telemetry service ("ceilometer") - Technology Preview.
Red Hat Enterprise Linux OpenStack Platform also includes these supporting technologies:
* Foreman OpenStack Manager, a utility for deploying enterprise-level OpenStack clouds.
* PackStack, a utility for rapidly deploying proof of concept OpenStack clouds.
* Open vSwitch, an implementation of the OpenFlow protocol for remote per flow control of network traffic.
For information on the scope and support implications of the Technology Preview designation applied to some included components refer to:
https://access.redhat.com/support/offerings/techpreview/
These updated packages also fix various bugs. Documentation for these bug fixes is available in the Technical Notes document:
https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux_OpenStack_Platform/3/html/Technical_Notes/index.html
This erratum includes rebases for core OpenStack services to the 2013.1.5 stable branch release.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated packages for Red Hat Enterprise Linux OpenStack Platform 3.0 (Grizzly), which fix bugs and add enhancements, are now available.", "title": "Topic" }, { "category": "general", "text": "Red Hat Enterprise Linux OpenStack Platform provides the facilities for building a private or public infrastructure-as-a-service (IaaS) cloud running on commonly available physical hardware. Services provided by these packages include:\n* OpenStack Block Storage service (\"cinder\").\n* OpenStack Compute service (\"nova\").\n* OpenStack Dashboard (\"horizon\").\n* OpenStack Image service (\"glance\").\n* OpenStack Identity (\"keystone\").\n* OpenStack Networking service (\"neutron\").\n* OpenStack Object Storage service (\"swift\").\n* OpenStack Orchestration service (\"heat\") - Technology Preview.\n* OpenStack Telemetry service (\"ceilometer\") - Technology Preview.\n\nRed Hat Enterprise Linux OpenStack Platform also includes these supporting technologies:\n* Foreman OpenStack Manager, a utility for deploying enterprise-level OpenStack clouds.\n* PackStack, a utility for rapidly deploying proof of concept OpenStack clouds.\n* Open vSwitch, an implementation of the OpenFlow protocol for remote per flow control of network traffic.\n\nFor information on the scope and support implications of the Technology Preview designation applied to some included components refer to:\nhttps://access.redhat.com/support/offerings/techpreview/\n\nThese updated packages also fix various bugs. Documentation for these bug fixes is available in the Technical Notes document:\nhttps://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux_OpenStack_Platform/3/html/Technical_Notes/index.html\n\nThis erratum includes rebases for core OpenStack services to the 2013.1.5 stable branch release.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHBA-2014:0363", "url": "https://access.redhat.com/errata/RHBA-2014:0363" }, { "category": "external", "summary": "1050214", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1050214" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhba-2014_0363.json" } ], "title": "Red Hat Bug Fix Advisory: Red Hat Enterprise Linux OpenStack Platform 3 Bug Fix and Enhancement Advisory", "tracking": { "current_release_date": "2024-11-22T07:25:52+00:00", "generator": { "date": "2024-11-22T07:25:52+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHBA-2014:0363", "initial_release_date": "2014-04-03T18:16:48+00:00", "revision_history": [ { "date": "2014-04-03T18:16:48+00:00", "number": "1", "summary": "Initial version" }, { "date": "2014-04-03T18:16:48+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T07:25:52+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux OpenStack Platform 3.0", "product": { "name": "Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:3::el6" } } } ], "category": "product_family", "name": "Red Hat OpenStack Platform" }, { "branches": [ { "category": "product_version", "name": "qemu-kvm-rhev-tools-2:0.12.1.2-2.415.el6_5.6.x86_64", "product": { "name": "qemu-kvm-rhev-tools-2:0.12.1.2-2.415.el6_5.6.x86_64", "product_id": "qemu-kvm-rhev-tools-2:0.12.1.2-2.415.el6_5.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev-tools@0.12.1.2-2.415.el6_5.6?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.415.el6_5.6.x86_64", "product": { "name": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.415.el6_5.6.x86_64", "product_id": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.415.el6_5.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev-debuginfo@0.12.1.2-2.415.el6_5.6?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-kvm-rhev-2:0.12.1.2-2.415.el6_5.6.x86_64", "product": { "name": "qemu-kvm-rhev-2:0.12.1.2-2.415.el6_5.6.x86_64", "product_id": "qemu-kvm-rhev-2:0.12.1.2-2.415.el6_5.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev@0.12.1.2-2.415.el6_5.6?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-img-rhev-2:0.12.1.2-2.415.el6_5.6.x86_64", "product": { "name": "qemu-img-rhev-2:0.12.1.2-2.415.el6_5.6.x86_64", "product_id": "qemu-img-rhev-2:0.12.1.2-2.415.el6_5.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-img-rhev@0.12.1.2-2.415.el6_5.6?arch=x86_64\u0026epoch=2" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "qemu-kvm-rhev-2:0.12.1.2-2.415.el6_5.6.src", "product": { "name": "qemu-kvm-rhev-2:0.12.1.2-2.415.el6_5.6.src", "product_id": "qemu-kvm-rhev-2:0.12.1.2-2.415.el6_5.6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev@0.12.1.2-2.415.el6_5.6?arch=src\u0026epoch=2" } } }, { "category": "product_version", "name": "openstack-quantum-0:2013.1.5-1.el6ost.src", "product": { "name": "openstack-quantum-0:2013.1.5-1.el6ost.src", "product_id": "openstack-quantum-0:2013.1.5-1.el6ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-quantum@2013.1.5-1.el6ost?arch=src" } } }, { "category": "product_version", "name": "openstack-glance-0:2013.1.5-1.el6ost.src", "product": { "name": "openstack-glance-0:2013.1.5-1.el6ost.src", "product_id": "openstack-glance-0:2013.1.5-1.el6ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-glance@2013.1.5-1.el6ost?arch=src" } } }, { "category": "product_version", "name": "openstack-cinder-0:2013.1.5-2.el6ost.src", "product": { "name": "openstack-cinder-0:2013.1.5-2.el6ost.src", "product_id": "openstack-cinder-0:2013.1.5-2.el6ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-cinder@2013.1.5-2.el6ost?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openstack-quantum-0:2013.1.5-1.el6ost.noarch", "product": { "name": "openstack-quantum-0:2013.1.5-1.el6ost.noarch", "product_id": "openstack-quantum-0:2013.1.5-1.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-quantum@2013.1.5-1.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "python-quantum-0:2013.1.5-1.el6ost.noarch", "product": { "name": "python-quantum-0:2013.1.5-1.el6ost.noarch", "product_id": "python-quantum-0:2013.1.5-1.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-quantum@2013.1.5-1.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-quantum-cisco-0:2013.1.5-1.el6ost.noarch", "product": { "name": "openstack-quantum-cisco-0:2013.1.5-1.el6ost.noarch", "product_id": "openstack-quantum-cisco-0:2013.1.5-1.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-quantum-cisco@2013.1.5-1.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-quantum-ryu-0:2013.1.5-1.el6ost.noarch", "product": { "name": "openstack-quantum-ryu-0:2013.1.5-1.el6ost.noarch", "product_id": "openstack-quantum-ryu-0:2013.1.5-1.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-quantum-ryu@2013.1.5-1.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-quantum-midonet-0:2013.1.5-1.el6ost.noarch", "product": { "name": "openstack-quantum-midonet-0:2013.1.5-1.el6ost.noarch", "product_id": "openstack-quantum-midonet-0:2013.1.5-1.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-quantum-midonet@2013.1.5-1.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-quantum-bigswitch-0:2013.1.5-1.el6ost.noarch", "product": { "name": "openstack-quantum-bigswitch-0:2013.1.5-1.el6ost.noarch", "product_id": "openstack-quantum-bigswitch-0:2013.1.5-1.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-quantum-bigswitch@2013.1.5-1.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-quantum-hyperv-0:2013.1.5-1.el6ost.noarch", "product": { "name": "openstack-quantum-hyperv-0:2013.1.5-1.el6ost.noarch", "product_id": "openstack-quantum-hyperv-0:2013.1.5-1.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-quantum-hyperv@2013.1.5-1.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-quantum-plumgrid-0:2013.1.5-1.el6ost.noarch", "product": { "name": "openstack-quantum-plumgrid-0:2013.1.5-1.el6ost.noarch", "product_id": "openstack-quantum-plumgrid-0:2013.1.5-1.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-quantum-plumgrid@2013.1.5-1.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-quantum-brocade-0:2013.1.5-1.el6ost.noarch", "product": { "name": "openstack-quantum-brocade-0:2013.1.5-1.el6ost.noarch", "product_id": "openstack-quantum-brocade-0:2013.1.5-1.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-quantum-brocade@2013.1.5-1.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-quantum-linuxbridge-0:2013.1.5-1.el6ost.noarch", "product": { "name": "openstack-quantum-linuxbridge-0:2013.1.5-1.el6ost.noarch", "product_id": "openstack-quantum-linuxbridge-0:2013.1.5-1.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-quantum-linuxbridge@2013.1.5-1.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-quantum-nicira-0:2013.1.5-1.el6ost.noarch", "product": { "name": "openstack-quantum-nicira-0:2013.1.5-1.el6ost.noarch", "product_id": "openstack-quantum-nicira-0:2013.1.5-1.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-quantum-nicira@2013.1.5-1.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-quantum-metaplugin-0:2013.1.5-1.el6ost.noarch", "product": { "name": "openstack-quantum-metaplugin-0:2013.1.5-1.el6ost.noarch", "product_id": "openstack-quantum-metaplugin-0:2013.1.5-1.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-quantum-metaplugin@2013.1.5-1.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-quantum-openvswitch-0:2013.1.5-1.el6ost.noarch", "product": { "name": "openstack-quantum-openvswitch-0:2013.1.5-1.el6ost.noarch", "product_id": "openstack-quantum-openvswitch-0:2013.1.5-1.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-quantum-openvswitch@2013.1.5-1.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-quantum-nec-0:2013.1.5-1.el6ost.noarch", "product": { "name": "openstack-quantum-nec-0:2013.1.5-1.el6ost.noarch", "product_id": "openstack-quantum-nec-0:2013.1.5-1.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-quantum-nec@2013.1.5-1.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-glance-doc-0:2013.1.5-1.el6ost.noarch", "product": { "name": "openstack-glance-doc-0:2013.1.5-1.el6ost.noarch", "product_id": "openstack-glance-doc-0:2013.1.5-1.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-glance-doc@2013.1.5-1.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "python-glance-0:2013.1.5-1.el6ost.noarch", "product": { "name": "python-glance-0:2013.1.5-1.el6ost.noarch", "product_id": "python-glance-0:2013.1.5-1.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-glance@2013.1.5-1.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-glance-0:2013.1.5-1.el6ost.noarch", "product": { "name": "openstack-glance-0:2013.1.5-1.el6ost.noarch", "product_id": "openstack-glance-0:2013.1.5-1.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-glance@2013.1.5-1.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "python-cinder-0:2013.1.5-2.el6ost.noarch", "product": { "name": "python-cinder-0:2013.1.5-2.el6ost.noarch", "product_id": "python-cinder-0:2013.1.5-2.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-cinder@2013.1.5-2.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-cinder-doc-0:2013.1.5-2.el6ost.noarch", "product": { "name": "openstack-cinder-doc-0:2013.1.5-2.el6ost.noarch", "product_id": "openstack-cinder-doc-0:2013.1.5-2.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-cinder-doc@2013.1.5-2.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-cinder-0:2013.1.5-2.el6ost.noarch", "product": { "name": "openstack-cinder-0:2013.1.5-2.el6ost.noarch", "product_id": "openstack-cinder-0:2013.1.5-2.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-cinder@2013.1.5-2.el6ost?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openstack-cinder-0:2013.1.5-2.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-cinder-0:2013.1.5-2.el6ost.noarch" }, "product_reference": "openstack-cinder-0:2013.1.5-2.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-cinder-0:2013.1.5-2.el6ost.src as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-cinder-0:2013.1.5-2.el6ost.src" }, "product_reference": "openstack-cinder-0:2013.1.5-2.el6ost.src", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-cinder-doc-0:2013.1.5-2.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-cinder-doc-0:2013.1.5-2.el6ost.noarch" }, "product_reference": "openstack-cinder-doc-0:2013.1.5-2.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-glance-0:2013.1.5-1.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-glance-0:2013.1.5-1.el6ost.noarch" }, "product_reference": "openstack-glance-0:2013.1.5-1.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-glance-0:2013.1.5-1.el6ost.src as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-glance-0:2013.1.5-1.el6ost.src" }, "product_reference": "openstack-glance-0:2013.1.5-1.el6ost.src", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-glance-doc-0:2013.1.5-1.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-glance-doc-0:2013.1.5-1.el6ost.noarch" }, "product_reference": "openstack-glance-doc-0:2013.1.5-1.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-quantum-0:2013.1.5-1.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-quantum-0:2013.1.5-1.el6ost.noarch" }, "product_reference": "openstack-quantum-0:2013.1.5-1.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-quantum-0:2013.1.5-1.el6ost.src as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-quantum-0:2013.1.5-1.el6ost.src" }, "product_reference": "openstack-quantum-0:2013.1.5-1.el6ost.src", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-quantum-bigswitch-0:2013.1.5-1.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-quantum-bigswitch-0:2013.1.5-1.el6ost.noarch" }, "product_reference": "openstack-quantum-bigswitch-0:2013.1.5-1.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-quantum-brocade-0:2013.1.5-1.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-quantum-brocade-0:2013.1.5-1.el6ost.noarch" }, "product_reference": "openstack-quantum-brocade-0:2013.1.5-1.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-quantum-cisco-0:2013.1.5-1.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-quantum-cisco-0:2013.1.5-1.el6ost.noarch" }, "product_reference": "openstack-quantum-cisco-0:2013.1.5-1.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-quantum-hyperv-0:2013.1.5-1.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-quantum-hyperv-0:2013.1.5-1.el6ost.noarch" }, "product_reference": "openstack-quantum-hyperv-0:2013.1.5-1.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-quantum-linuxbridge-0:2013.1.5-1.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-quantum-linuxbridge-0:2013.1.5-1.el6ost.noarch" }, "product_reference": "openstack-quantum-linuxbridge-0:2013.1.5-1.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-quantum-metaplugin-0:2013.1.5-1.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-quantum-metaplugin-0:2013.1.5-1.el6ost.noarch" }, "product_reference": "openstack-quantum-metaplugin-0:2013.1.5-1.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-quantum-midonet-0:2013.1.5-1.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-quantum-midonet-0:2013.1.5-1.el6ost.noarch" }, "product_reference": "openstack-quantum-midonet-0:2013.1.5-1.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-quantum-nec-0:2013.1.5-1.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-quantum-nec-0:2013.1.5-1.el6ost.noarch" }, "product_reference": "openstack-quantum-nec-0:2013.1.5-1.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-quantum-nicira-0:2013.1.5-1.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-quantum-nicira-0:2013.1.5-1.el6ost.noarch" }, "product_reference": "openstack-quantum-nicira-0:2013.1.5-1.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-quantum-openvswitch-0:2013.1.5-1.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-quantum-openvswitch-0:2013.1.5-1.el6ost.noarch" }, "product_reference": "openstack-quantum-openvswitch-0:2013.1.5-1.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-quantum-plumgrid-0:2013.1.5-1.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-quantum-plumgrid-0:2013.1.5-1.el6ost.noarch" }, "product_reference": "openstack-quantum-plumgrid-0:2013.1.5-1.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-quantum-ryu-0:2013.1.5-1.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-quantum-ryu-0:2013.1.5-1.el6ost.noarch" }, "product_reference": "openstack-quantum-ryu-0:2013.1.5-1.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "python-cinder-0:2013.1.5-2.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:python-cinder-0:2013.1.5-2.el6ost.noarch" }, "product_reference": "python-cinder-0:2013.1.5-2.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "python-glance-0:2013.1.5-1.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:python-glance-0:2013.1.5-1.el6ost.noarch" }, "product_reference": "python-glance-0:2013.1.5-1.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "python-quantum-0:2013.1.5-1.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:python-quantum-0:2013.1.5-1.el6ost.noarch" }, "product_reference": "python-quantum-0:2013.1.5-1.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-img-rhev-2:0.12.1.2-2.415.el6_5.6.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:qemu-img-rhev-2:0.12.1.2-2.415.el6_5.6.x86_64" }, "product_reference": "qemu-img-rhev-2:0.12.1.2-2.415.el6_5.6.x86_64", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-2:0.12.1.2-2.415.el6_5.6.src as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:qemu-kvm-rhev-2:0.12.1.2-2.415.el6_5.6.src" }, "product_reference": "qemu-kvm-rhev-2:0.12.1.2-2.415.el6_5.6.src", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-2:0.12.1.2-2.415.el6_5.6.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:qemu-kvm-rhev-2:0.12.1.2-2.415.el6_5.6.x86_64" }, "product_reference": "qemu-kvm-rhev-2:0.12.1.2-2.415.el6_5.6.x86_64", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.415.el6_5.6.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.415.el6_5.6.x86_64" }, "product_reference": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.415.el6_5.6.x86_64", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-tools-2:0.12.1.2-2.415.el6_5.6.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:qemu-kvm-rhev-tools-2:0.12.1.2-2.415.el6_5.6.x86_64" }, "product_reference": "qemu-kvm-rhev-tools-2:0.12.1.2-2.415.el6_5.6.x86_64", "relates_to_product_reference": "6Server-Grizzly" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-6491", "discovery_date": "2014-01-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1059504" } ], "notes": [ { "category": "description", "text": "The python-qpid client (common/rpc/impl_qpid.py) in OpenStack Oslo before 2013.2 does not enforce SSL connections when qpid_protocol is set to ssl, which allows remote attackers to obtain sensitive information by sniffing the network.", "title": "Vulnerability description" }, { "category": "summary", "text": "nova: qpid SSL configuration", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-Grizzly:openstack-cinder-0:2013.1.5-2.el6ost.noarch", "6Server-Grizzly:openstack-cinder-0:2013.1.5-2.el6ost.src", "6Server-Grizzly:openstack-cinder-doc-0:2013.1.5-2.el6ost.noarch", "6Server-Grizzly:openstack-glance-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-glance-0:2013.1.5-1.el6ost.src", "6Server-Grizzly:openstack-glance-doc-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-0:2013.1.5-1.el6ost.src", "6Server-Grizzly:openstack-quantum-bigswitch-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-brocade-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-cisco-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-hyperv-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-linuxbridge-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-metaplugin-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-midonet-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-nec-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-nicira-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-openvswitch-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-plumgrid-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-ryu-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:python-cinder-0:2013.1.5-2.el6ost.noarch", "6Server-Grizzly:python-glance-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:python-quantum-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:qemu-img-rhev-2:0.12.1.2-2.415.el6_5.6.x86_64", "6Server-Grizzly:qemu-kvm-rhev-2:0.12.1.2-2.415.el6_5.6.src", "6Server-Grizzly:qemu-kvm-rhev-2:0.12.1.2-2.415.el6_5.6.x86_64", "6Server-Grizzly:qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.415.el6_5.6.x86_64", "6Server-Grizzly:qemu-kvm-rhev-tools-2:0.12.1.2-2.415.el6_5.6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-6491" }, { "category": "external", "summary": "RHBZ#1059504", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1059504" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-6491", "url": "https://www.cve.org/CVERecord?id=CVE-2013-6491" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-6491", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-6491" } ], "release_date": "2013-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-04-03T18:16:48+00:00", "details": "Before applying this update, ensure all previously released errata\nrelevant to your system have been applied.\n\nRed Hat Enterprise Linux OpenStack Platform 3 runs on the latest available version of Red Hat Enterprise Linux 6.\n\nThe Red Hat Enterprise Linux OpenStack Platform 3 Release Notes contain the\nfollowing:\n* An explanation of the way in which the provided components interact to form a working cloud computing environment.\n* Technology Previews, Recommended Practices, Known Issues and Deprecated Functionality.\n* The channels required for Red Hat Enterprise Linux OpenStack Platform 3, including which channels need to be enabled and disabled.\n\nThe Release Notes are available at:\nhttps://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux_OpenStack_Platform/3/html/Release_Notes/index.html\n\nThis update is available through the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "6Server-Grizzly:openstack-cinder-0:2013.1.5-2.el6ost.noarch", "6Server-Grizzly:openstack-cinder-0:2013.1.5-2.el6ost.src", "6Server-Grizzly:openstack-cinder-doc-0:2013.1.5-2.el6ost.noarch", "6Server-Grizzly:openstack-glance-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-glance-0:2013.1.5-1.el6ost.src", "6Server-Grizzly:openstack-glance-doc-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-0:2013.1.5-1.el6ost.src", "6Server-Grizzly:openstack-quantum-bigswitch-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-brocade-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-cisco-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-hyperv-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-linuxbridge-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-metaplugin-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-midonet-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-nec-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-nicira-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-openvswitch-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-plumgrid-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-ryu-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:python-cinder-0:2013.1.5-2.el6ost.noarch", "6Server-Grizzly:python-glance-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:python-quantum-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:qemu-img-rhev-2:0.12.1.2-2.415.el6_5.6.x86_64", "6Server-Grizzly:qemu-kvm-rhev-2:0.12.1.2-2.415.el6_5.6.src", "6Server-Grizzly:qemu-kvm-rhev-2:0.12.1.2-2.415.el6_5.6.x86_64", "6Server-Grizzly:qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.415.el6_5.6.x86_64", "6Server-Grizzly:qemu-kvm-rhev-tools-2:0.12.1.2-2.415.el6_5.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHBA-2014:0363" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Server-Grizzly:openstack-cinder-0:2013.1.5-2.el6ost.noarch", "6Server-Grizzly:openstack-cinder-0:2013.1.5-2.el6ost.src", "6Server-Grizzly:openstack-cinder-doc-0:2013.1.5-2.el6ost.noarch", "6Server-Grizzly:openstack-glance-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-glance-0:2013.1.5-1.el6ost.src", "6Server-Grizzly:openstack-glance-doc-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-0:2013.1.5-1.el6ost.src", "6Server-Grizzly:openstack-quantum-bigswitch-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-brocade-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-cisco-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-hyperv-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-linuxbridge-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-metaplugin-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-midonet-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-nec-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-nicira-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-openvswitch-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-plumgrid-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-ryu-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:python-cinder-0:2013.1.5-2.el6ost.noarch", "6Server-Grizzly:python-glance-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:python-quantum-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:qemu-img-rhev-2:0.12.1.2-2.415.el6_5.6.x86_64", "6Server-Grizzly:qemu-kvm-rhev-2:0.12.1.2-2.415.el6_5.6.src", "6Server-Grizzly:qemu-kvm-rhev-2:0.12.1.2-2.415.el6_5.6.x86_64", "6Server-Grizzly:qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.415.el6_5.6.x86_64", "6Server-Grizzly:qemu-kvm-rhev-tools-2:0.12.1.2-2.415.el6_5.6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nova: qpid SSL configuration" } ] }
RHSA-2014:0112
Vulnerability from csaf_redhat
Published
2014-01-30 19:58
Modified
2024-11-22 07:25
Summary
Red Hat Security Advisory: openstack-nova security and bug fix update
Notes
Topic
Updated openstack-nova packages that fix two security issues and three bugs
are now available for Red Hat Enterprise Linux OpenStack Platform 3.0.
The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.
Details
The openstack-nova packages provide OpenStack Compute (nova), which
provides services for provisioning, managing, and using virtual
machine instances.
It was discovered that enabling "qpid_protocol = ssl" in the nova.conf file
did not result in nova using SSL to communicate to Qpid. If Qpid was not
configured to enforce SSL this could lead to sensitive information being
sent unencrypted over the communication channel. (CVE-2013-6491)
A flaw was found in the way OpenStack Compute controlled the size of disk
images. An authenticated remote user could use malicious compressed qcow2
disk images to consume large amounts of disk space, potentially causing a
denial of service on the OpenStack Compute nodes. (CVE-2013-4463)
Red Hat would like to thank the OpenStack project for reporting
CVE-2013-4463. Upstream acknowledges Bernhard M. Wiedemann of SuSE as the
original reporter of this issue.
This update also fixes the following bugs:
* When using GroupAntiAffinityFilter, the scheduler was not filtering
instances in the group, which could cause an instance to not be scheduled
at all if a group was specified on boot. With this fix, groups are taken
into account and the instance is scheduled as expected. (BZ#1014948)
* If an exchange had not been created previously by a consumer, the
publisher would crash because it could not find the specified exchange.
This resulted from Qpid's direct publisher using the wrong exchange type
'Direct'. With this fix, the exchange type in the publisher has been
changed to 'direct'. (BZ#1042055)
* Unhandled errors in the Qpid consuming thread could kill it silently and
isolate the component from the rest of the system. To fix this, the
consuming thread has been made more resilient to errors by ensuring it does
not die on an unhandled error. Compute now logs the error and retries the
consuming thread. (BZ#1050213)
All openstack-nova users are advised to upgrade to these updated packages,
which contain backported patches to correct these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated openstack-nova packages that fix two security issues and three bugs\nare now available for Red Hat Enterprise Linux OpenStack Platform 3.0.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.", "title": "Topic" }, { "category": "general", "text": "The openstack-nova packages provide OpenStack Compute (nova), which\nprovides services for provisioning, managing, and using virtual\nmachine instances.\n\nIt was discovered that enabling \"qpid_protocol = ssl\" in the nova.conf file\ndid not result in nova using SSL to communicate to Qpid. If Qpid was not\nconfigured to enforce SSL this could lead to sensitive information being\nsent unencrypted over the communication channel. (CVE-2013-6491)\n\nA flaw was found in the way OpenStack Compute controlled the size of disk\nimages. An authenticated remote user could use malicious compressed qcow2\ndisk images to consume large amounts of disk space, potentially causing a\ndenial of service on the OpenStack Compute nodes. (CVE-2013-4463)\n\nRed Hat would like to thank the OpenStack project for reporting\nCVE-2013-4463. Upstream acknowledges Bernhard M. Wiedemann of SuSE as the\noriginal reporter of this issue.\n\nThis update also fixes the following bugs:\n\n* When using GroupAntiAffinityFilter, the scheduler was not filtering\ninstances in the group, which could cause an instance to not be scheduled\nat all if a group was specified on boot. With this fix, groups are taken\ninto account and the instance is scheduled as expected. (BZ#1014948)\n\n* If an exchange had not been created previously by a consumer, the\npublisher would crash because it could not find the specified exchange.\nThis resulted from Qpid\u0027s direct publisher using the wrong exchange type\n\u0027Direct\u0027. With this fix, the exchange type in the publisher has been\nchanged to \u0027direct\u0027. (BZ#1042055)\n\n* Unhandled errors in the Qpid consuming thread could kill it silently and\nisolate the component from the rest of the system. To fix this, the\nconsuming thread has been made more resilient to errors by ensuring it does\nnot die on an unhandled error. Compute now logs the error and retries the\nconsuming thread. (BZ#1050213)\n\nAll openstack-nova users are advised to upgrade to these updated packages,\nwhich contain backported patches to correct these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2014:0112", "url": "https://access.redhat.com/errata/RHSA-2014:0112" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "996766", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=996766" }, { "category": "external", "summary": "1014948", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1014948" }, { "category": "external", "summary": "1023239", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1023239" }, { "category": "external", "summary": "1044562", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1044562" }, { "category": "external", "summary": "1050213", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1050213" }, { "category": "external", "summary": "1059504", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1059504" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_0112.json" } ], "title": "Red Hat Security Advisory: openstack-nova security and bug fix update", "tracking": { "current_release_date": "2024-11-22T07:25:48+00:00", "generator": { "date": "2024-11-22T07:25:48+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2014:0112", "initial_release_date": "2014-01-30T19:58:47+00:00", "revision_history": [ { "date": "2014-01-30T19:58:47+00:00", "number": "1", "summary": "Initial version" }, { "date": "2014-01-30T19:58:47+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T07:25:48+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux OpenStack Platform 3.0", "product": { "name": "Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:3::el6" } } } ], "category": "product_family", "name": "Red Hat OpenStack Platform" }, { "branches": [ { "category": "product_version", "name": "openstack-nova-api-0:2013.1.4-4.el6ost.noarch", "product": { "name": "openstack-nova-api-0:2013.1.4-4.el6ost.noarch", "product_id": "openstack-nova-api-0:2013.1.4-4.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-nova-api@2013.1.4-4.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-nova-conductor-0:2013.1.4-4.el6ost.noarch", "product": { "name": "openstack-nova-conductor-0:2013.1.4-4.el6ost.noarch", "product_id": "openstack-nova-conductor-0:2013.1.4-4.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-nova-conductor@2013.1.4-4.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-nova-scheduler-0:2013.1.4-4.el6ost.noarch", "product": { "name": "openstack-nova-scheduler-0:2013.1.4-4.el6ost.noarch", "product_id": "openstack-nova-scheduler-0:2013.1.4-4.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-nova-scheduler@2013.1.4-4.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-nova-0:2013.1.4-4.el6ost.noarch", "product": { "name": "openstack-nova-0:2013.1.4-4.el6ost.noarch", "product_id": "openstack-nova-0:2013.1.4-4.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-nova@2013.1.4-4.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-nova-cells-0:2013.1.4-4.el6ost.noarch", "product": { "name": "openstack-nova-cells-0:2013.1.4-4.el6ost.noarch", "product_id": "openstack-nova-cells-0:2013.1.4-4.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-nova-cells@2013.1.4-4.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-nova-cert-0:2013.1.4-4.el6ost.noarch", "product": { "name": "openstack-nova-cert-0:2013.1.4-4.el6ost.noarch", "product_id": "openstack-nova-cert-0:2013.1.4-4.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-nova-cert@2013.1.4-4.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-nova-console-0:2013.1.4-4.el6ost.noarch", "product": { "name": "openstack-nova-console-0:2013.1.4-4.el6ost.noarch", "product_id": "openstack-nova-console-0:2013.1.4-4.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-nova-console@2013.1.4-4.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-nova-doc-0:2013.1.4-4.el6ost.noarch", "product": { "name": "openstack-nova-doc-0:2013.1.4-4.el6ost.noarch", "product_id": "openstack-nova-doc-0:2013.1.4-4.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-nova-doc@2013.1.4-4.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-nova-network-0:2013.1.4-4.el6ost.noarch", "product": { "name": "openstack-nova-network-0:2013.1.4-4.el6ost.noarch", "product_id": "openstack-nova-network-0:2013.1.4-4.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-nova-network@2013.1.4-4.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-nova-compute-0:2013.1.4-4.el6ost.noarch", "product": { "name": "openstack-nova-compute-0:2013.1.4-4.el6ost.noarch", "product_id": "openstack-nova-compute-0:2013.1.4-4.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-nova-compute@2013.1.4-4.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-nova-common-0:2013.1.4-4.el6ost.noarch", "product": { "name": "openstack-nova-common-0:2013.1.4-4.el6ost.noarch", "product_id": "openstack-nova-common-0:2013.1.4-4.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-nova-common@2013.1.4-4.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "python-nova-0:2013.1.4-4.el6ost.noarch", "product": { "name": "python-nova-0:2013.1.4-4.el6ost.noarch", "product_id": "python-nova-0:2013.1.4-4.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-nova@2013.1.4-4.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-nova-objectstore-0:2013.1.4-4.el6ost.noarch", "product": { "name": "openstack-nova-objectstore-0:2013.1.4-4.el6ost.noarch", "product_id": "openstack-nova-objectstore-0:2013.1.4-4.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-nova-objectstore@2013.1.4-4.el6ost?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "openstack-nova-0:2013.1.4-4.el6ost.src", "product": { "name": "openstack-nova-0:2013.1.4-4.el6ost.src", "product_id": "openstack-nova-0:2013.1.4-4.el6ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-nova@2013.1.4-4.el6ost?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openstack-nova-0:2013.1.4-4.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-nova-0:2013.1.4-4.el6ost.noarch" }, "product_reference": "openstack-nova-0:2013.1.4-4.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-nova-0:2013.1.4-4.el6ost.src as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-nova-0:2013.1.4-4.el6ost.src" }, "product_reference": "openstack-nova-0:2013.1.4-4.el6ost.src", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-nova-api-0:2013.1.4-4.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-nova-api-0:2013.1.4-4.el6ost.noarch" }, "product_reference": "openstack-nova-api-0:2013.1.4-4.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-nova-cells-0:2013.1.4-4.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-nova-cells-0:2013.1.4-4.el6ost.noarch" }, "product_reference": "openstack-nova-cells-0:2013.1.4-4.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-nova-cert-0:2013.1.4-4.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-nova-cert-0:2013.1.4-4.el6ost.noarch" }, "product_reference": "openstack-nova-cert-0:2013.1.4-4.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-nova-common-0:2013.1.4-4.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-nova-common-0:2013.1.4-4.el6ost.noarch" }, "product_reference": "openstack-nova-common-0:2013.1.4-4.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-nova-compute-0:2013.1.4-4.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-nova-compute-0:2013.1.4-4.el6ost.noarch" }, "product_reference": "openstack-nova-compute-0:2013.1.4-4.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-nova-conductor-0:2013.1.4-4.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-nova-conductor-0:2013.1.4-4.el6ost.noarch" }, "product_reference": "openstack-nova-conductor-0:2013.1.4-4.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-nova-console-0:2013.1.4-4.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-nova-console-0:2013.1.4-4.el6ost.noarch" }, "product_reference": "openstack-nova-console-0:2013.1.4-4.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-nova-doc-0:2013.1.4-4.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-nova-doc-0:2013.1.4-4.el6ost.noarch" }, "product_reference": "openstack-nova-doc-0:2013.1.4-4.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-nova-network-0:2013.1.4-4.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-nova-network-0:2013.1.4-4.el6ost.noarch" }, "product_reference": "openstack-nova-network-0:2013.1.4-4.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-nova-objectstore-0:2013.1.4-4.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-nova-objectstore-0:2013.1.4-4.el6ost.noarch" }, "product_reference": "openstack-nova-objectstore-0:2013.1.4-4.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-nova-scheduler-0:2013.1.4-4.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-nova-scheduler-0:2013.1.4-4.el6ost.noarch" }, "product_reference": "openstack-nova-scheduler-0:2013.1.4-4.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "python-nova-0:2013.1.4-4.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:python-nova-0:2013.1.4-4.el6ost.noarch" }, "product_reference": "python-nova-0:2013.1.4-4.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Thierry Carrez" ], "organization": "OpenStack project" }, { "names": [ "Bernhard M. Wiedemann" ], "organization": "SuSE", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2013-4463", "discovery_date": "2013-10-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1023239" } ], "notes": [ { "category": "description", "text": "OpenStack Compute (Nova) Folsom, Grizzly, and Havana does not properly verify the virtual size of a QCOW2 image, which allows local users to cause a denial of service (host file system disk consumption) via a compressed QCOW2 image. NOTE: this issue is due to an incomplete fix for CVE-2013-2096.", "title": "Vulnerability description" }, { "category": "summary", "text": "Nova: Compressed disk image DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "The Red Hat Security Response Team has rated this issue as having moderate security impact. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-Grizzly:openstack-nova-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-0:2013.1.4-4.el6ost.src", "6Server-Grizzly:openstack-nova-api-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-cells-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-cert-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-common-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-compute-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-conductor-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-console-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-doc-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-network-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-objectstore-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-scheduler-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:python-nova-0:2013.1.4-4.el6ost.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-4463" }, { "category": "external", "summary": "RHBZ#1023239", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1023239" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-4463", "url": "https://www.cve.org/CVERecord?id=CVE-2013-4463" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4463", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4463" } ], "release_date": "2013-10-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-01-30T19:58:47+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "6Server-Grizzly:openstack-nova-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-0:2013.1.4-4.el6ost.src", "6Server-Grizzly:openstack-nova-api-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-cells-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-cert-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-common-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-compute-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-conductor-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-console-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-doc-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-network-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-objectstore-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-scheduler-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:python-nova-0:2013.1.4-4.el6ost.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0112" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Server-Grizzly:openstack-nova-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-0:2013.1.4-4.el6ost.src", "6Server-Grizzly:openstack-nova-api-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-cells-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-cert-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-common-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-compute-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-conductor-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-console-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-doc-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-network-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-objectstore-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-scheduler-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:python-nova-0:2013.1.4-4.el6ost.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Nova: Compressed disk image DoS" }, { "cve": "CVE-2013-6491", "discovery_date": "2014-01-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1059504" } ], "notes": [ { "category": "description", "text": "The python-qpid client (common/rpc/impl_qpid.py) in OpenStack Oslo before 2013.2 does not enforce SSL connections when qpid_protocol is set to ssl, which allows remote attackers to obtain sensitive information by sniffing the network.", "title": "Vulnerability description" }, { "category": "summary", "text": "nova: qpid SSL configuration", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-Grizzly:openstack-nova-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-0:2013.1.4-4.el6ost.src", "6Server-Grizzly:openstack-nova-api-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-cells-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-cert-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-common-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-compute-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-conductor-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-console-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-doc-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-network-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-objectstore-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-scheduler-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:python-nova-0:2013.1.4-4.el6ost.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-6491" }, { "category": "external", "summary": "RHBZ#1059504", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1059504" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-6491", "url": "https://www.cve.org/CVERecord?id=CVE-2013-6491" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-6491", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-6491" } ], "release_date": "2013-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-01-30T19:58:47+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "6Server-Grizzly:openstack-nova-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-0:2013.1.4-4.el6ost.src", "6Server-Grizzly:openstack-nova-api-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-cells-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-cert-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-common-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-compute-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-conductor-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-console-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-doc-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-network-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-objectstore-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-scheduler-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:python-nova-0:2013.1.4-4.el6ost.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0112" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Server-Grizzly:openstack-nova-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-0:2013.1.4-4.el6ost.src", "6Server-Grizzly:openstack-nova-api-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-cells-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-cert-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-common-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-compute-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-conductor-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-console-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-doc-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-network-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-objectstore-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-scheduler-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:python-nova-0:2013.1.4-4.el6ost.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nova: qpid SSL configuration" } ] }
rhba-2014_0363
Vulnerability from csaf_redhat
Published
2014-04-03 18:16
Modified
2024-11-22 07:25
Summary
Red Hat Bug Fix Advisory: Red Hat Enterprise Linux OpenStack Platform 3 Bug Fix and Enhancement Advisory
Notes
Topic
Updated packages for Red Hat Enterprise Linux OpenStack Platform 3.0 (Grizzly), which fix bugs and add enhancements, are now available.
Details
Red Hat Enterprise Linux OpenStack Platform provides the facilities for building a private or public infrastructure-as-a-service (IaaS) cloud running on commonly available physical hardware. Services provided by these packages include:
* OpenStack Block Storage service ("cinder").
* OpenStack Compute service ("nova").
* OpenStack Dashboard ("horizon").
* OpenStack Image service ("glance").
* OpenStack Identity ("keystone").
* OpenStack Networking service ("neutron").
* OpenStack Object Storage service ("swift").
* OpenStack Orchestration service ("heat") - Technology Preview.
* OpenStack Telemetry service ("ceilometer") - Technology Preview.
Red Hat Enterprise Linux OpenStack Platform also includes these supporting technologies:
* Foreman OpenStack Manager, a utility for deploying enterprise-level OpenStack clouds.
* PackStack, a utility for rapidly deploying proof of concept OpenStack clouds.
* Open vSwitch, an implementation of the OpenFlow protocol for remote per flow control of network traffic.
For information on the scope and support implications of the Technology Preview designation applied to some included components refer to:
https://access.redhat.com/support/offerings/techpreview/
These updated packages also fix various bugs. Documentation for these bug fixes is available in the Technical Notes document:
https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux_OpenStack_Platform/3/html/Technical_Notes/index.html
This erratum includes rebases for core OpenStack services to the 2013.1.5 stable branch release.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated packages for Red Hat Enterprise Linux OpenStack Platform 3.0 (Grizzly), which fix bugs and add enhancements, are now available.", "title": "Topic" }, { "category": "general", "text": "Red Hat Enterprise Linux OpenStack Platform provides the facilities for building a private or public infrastructure-as-a-service (IaaS) cloud running on commonly available physical hardware. Services provided by these packages include:\n* OpenStack Block Storage service (\"cinder\").\n* OpenStack Compute service (\"nova\").\n* OpenStack Dashboard (\"horizon\").\n* OpenStack Image service (\"glance\").\n* OpenStack Identity (\"keystone\").\n* OpenStack Networking service (\"neutron\").\n* OpenStack Object Storage service (\"swift\").\n* OpenStack Orchestration service (\"heat\") - Technology Preview.\n* OpenStack Telemetry service (\"ceilometer\") - Technology Preview.\n\nRed Hat Enterprise Linux OpenStack Platform also includes these supporting technologies:\n* Foreman OpenStack Manager, a utility for deploying enterprise-level OpenStack clouds.\n* PackStack, a utility for rapidly deploying proof of concept OpenStack clouds.\n* Open vSwitch, an implementation of the OpenFlow protocol for remote per flow control of network traffic.\n\nFor information on the scope and support implications of the Technology Preview designation applied to some included components refer to:\nhttps://access.redhat.com/support/offerings/techpreview/\n\nThese updated packages also fix various bugs. Documentation for these bug fixes is available in the Technical Notes document:\nhttps://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux_OpenStack_Platform/3/html/Technical_Notes/index.html\n\nThis erratum includes rebases for core OpenStack services to the 2013.1.5 stable branch release.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHBA-2014:0363", "url": "https://access.redhat.com/errata/RHBA-2014:0363" }, { "category": "external", "summary": "1050214", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1050214" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhba-2014_0363.json" } ], "title": "Red Hat Bug Fix Advisory: Red Hat Enterprise Linux OpenStack Platform 3 Bug Fix and Enhancement Advisory", "tracking": { "current_release_date": "2024-11-22T07:25:52+00:00", "generator": { "date": "2024-11-22T07:25:52+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHBA-2014:0363", "initial_release_date": "2014-04-03T18:16:48+00:00", "revision_history": [ { "date": "2014-04-03T18:16:48+00:00", "number": "1", "summary": "Initial version" }, { "date": "2014-04-03T18:16:48+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T07:25:52+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux OpenStack Platform 3.0", "product": { "name": "Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:3::el6" } } } ], "category": "product_family", "name": "Red Hat OpenStack Platform" }, { "branches": [ { "category": "product_version", "name": "qemu-kvm-rhev-tools-2:0.12.1.2-2.415.el6_5.6.x86_64", "product": { "name": "qemu-kvm-rhev-tools-2:0.12.1.2-2.415.el6_5.6.x86_64", "product_id": "qemu-kvm-rhev-tools-2:0.12.1.2-2.415.el6_5.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev-tools@0.12.1.2-2.415.el6_5.6?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.415.el6_5.6.x86_64", "product": { "name": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.415.el6_5.6.x86_64", "product_id": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.415.el6_5.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev-debuginfo@0.12.1.2-2.415.el6_5.6?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-kvm-rhev-2:0.12.1.2-2.415.el6_5.6.x86_64", "product": { "name": "qemu-kvm-rhev-2:0.12.1.2-2.415.el6_5.6.x86_64", "product_id": "qemu-kvm-rhev-2:0.12.1.2-2.415.el6_5.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev@0.12.1.2-2.415.el6_5.6?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-img-rhev-2:0.12.1.2-2.415.el6_5.6.x86_64", "product": { "name": "qemu-img-rhev-2:0.12.1.2-2.415.el6_5.6.x86_64", "product_id": "qemu-img-rhev-2:0.12.1.2-2.415.el6_5.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-img-rhev@0.12.1.2-2.415.el6_5.6?arch=x86_64\u0026epoch=2" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "qemu-kvm-rhev-2:0.12.1.2-2.415.el6_5.6.src", "product": { "name": "qemu-kvm-rhev-2:0.12.1.2-2.415.el6_5.6.src", "product_id": "qemu-kvm-rhev-2:0.12.1.2-2.415.el6_5.6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev@0.12.1.2-2.415.el6_5.6?arch=src\u0026epoch=2" } } }, { "category": "product_version", "name": "openstack-quantum-0:2013.1.5-1.el6ost.src", "product": { "name": "openstack-quantum-0:2013.1.5-1.el6ost.src", "product_id": "openstack-quantum-0:2013.1.5-1.el6ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-quantum@2013.1.5-1.el6ost?arch=src" } } }, { "category": "product_version", "name": "openstack-glance-0:2013.1.5-1.el6ost.src", "product": { "name": "openstack-glance-0:2013.1.5-1.el6ost.src", "product_id": "openstack-glance-0:2013.1.5-1.el6ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-glance@2013.1.5-1.el6ost?arch=src" } } }, { "category": "product_version", "name": "openstack-cinder-0:2013.1.5-2.el6ost.src", "product": { "name": "openstack-cinder-0:2013.1.5-2.el6ost.src", "product_id": "openstack-cinder-0:2013.1.5-2.el6ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-cinder@2013.1.5-2.el6ost?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openstack-quantum-0:2013.1.5-1.el6ost.noarch", "product": { "name": "openstack-quantum-0:2013.1.5-1.el6ost.noarch", "product_id": "openstack-quantum-0:2013.1.5-1.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-quantum@2013.1.5-1.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "python-quantum-0:2013.1.5-1.el6ost.noarch", "product": { "name": "python-quantum-0:2013.1.5-1.el6ost.noarch", "product_id": "python-quantum-0:2013.1.5-1.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-quantum@2013.1.5-1.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-quantum-cisco-0:2013.1.5-1.el6ost.noarch", "product": { "name": "openstack-quantum-cisco-0:2013.1.5-1.el6ost.noarch", "product_id": "openstack-quantum-cisco-0:2013.1.5-1.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-quantum-cisco@2013.1.5-1.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-quantum-ryu-0:2013.1.5-1.el6ost.noarch", "product": { "name": "openstack-quantum-ryu-0:2013.1.5-1.el6ost.noarch", "product_id": "openstack-quantum-ryu-0:2013.1.5-1.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-quantum-ryu@2013.1.5-1.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-quantum-midonet-0:2013.1.5-1.el6ost.noarch", "product": { "name": "openstack-quantum-midonet-0:2013.1.5-1.el6ost.noarch", "product_id": "openstack-quantum-midonet-0:2013.1.5-1.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-quantum-midonet@2013.1.5-1.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-quantum-bigswitch-0:2013.1.5-1.el6ost.noarch", "product": { "name": "openstack-quantum-bigswitch-0:2013.1.5-1.el6ost.noarch", "product_id": "openstack-quantum-bigswitch-0:2013.1.5-1.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-quantum-bigswitch@2013.1.5-1.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-quantum-hyperv-0:2013.1.5-1.el6ost.noarch", "product": { "name": "openstack-quantum-hyperv-0:2013.1.5-1.el6ost.noarch", "product_id": "openstack-quantum-hyperv-0:2013.1.5-1.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-quantum-hyperv@2013.1.5-1.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-quantum-plumgrid-0:2013.1.5-1.el6ost.noarch", "product": { "name": "openstack-quantum-plumgrid-0:2013.1.5-1.el6ost.noarch", "product_id": "openstack-quantum-plumgrid-0:2013.1.5-1.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-quantum-plumgrid@2013.1.5-1.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-quantum-brocade-0:2013.1.5-1.el6ost.noarch", "product": { "name": "openstack-quantum-brocade-0:2013.1.5-1.el6ost.noarch", "product_id": "openstack-quantum-brocade-0:2013.1.5-1.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-quantum-brocade@2013.1.5-1.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-quantum-linuxbridge-0:2013.1.5-1.el6ost.noarch", "product": { "name": "openstack-quantum-linuxbridge-0:2013.1.5-1.el6ost.noarch", "product_id": "openstack-quantum-linuxbridge-0:2013.1.5-1.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-quantum-linuxbridge@2013.1.5-1.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-quantum-nicira-0:2013.1.5-1.el6ost.noarch", "product": { "name": "openstack-quantum-nicira-0:2013.1.5-1.el6ost.noarch", "product_id": "openstack-quantum-nicira-0:2013.1.5-1.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-quantum-nicira@2013.1.5-1.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-quantum-metaplugin-0:2013.1.5-1.el6ost.noarch", "product": { "name": "openstack-quantum-metaplugin-0:2013.1.5-1.el6ost.noarch", "product_id": "openstack-quantum-metaplugin-0:2013.1.5-1.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-quantum-metaplugin@2013.1.5-1.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-quantum-openvswitch-0:2013.1.5-1.el6ost.noarch", "product": { "name": "openstack-quantum-openvswitch-0:2013.1.5-1.el6ost.noarch", "product_id": "openstack-quantum-openvswitch-0:2013.1.5-1.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-quantum-openvswitch@2013.1.5-1.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-quantum-nec-0:2013.1.5-1.el6ost.noarch", "product": { "name": "openstack-quantum-nec-0:2013.1.5-1.el6ost.noarch", "product_id": "openstack-quantum-nec-0:2013.1.5-1.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-quantum-nec@2013.1.5-1.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-glance-doc-0:2013.1.5-1.el6ost.noarch", "product": { "name": "openstack-glance-doc-0:2013.1.5-1.el6ost.noarch", "product_id": "openstack-glance-doc-0:2013.1.5-1.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-glance-doc@2013.1.5-1.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "python-glance-0:2013.1.5-1.el6ost.noarch", "product": { "name": "python-glance-0:2013.1.5-1.el6ost.noarch", "product_id": "python-glance-0:2013.1.5-1.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-glance@2013.1.5-1.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-glance-0:2013.1.5-1.el6ost.noarch", "product": { "name": "openstack-glance-0:2013.1.5-1.el6ost.noarch", "product_id": "openstack-glance-0:2013.1.5-1.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-glance@2013.1.5-1.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "python-cinder-0:2013.1.5-2.el6ost.noarch", "product": { "name": "python-cinder-0:2013.1.5-2.el6ost.noarch", "product_id": "python-cinder-0:2013.1.5-2.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-cinder@2013.1.5-2.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-cinder-doc-0:2013.1.5-2.el6ost.noarch", "product": { "name": "openstack-cinder-doc-0:2013.1.5-2.el6ost.noarch", "product_id": "openstack-cinder-doc-0:2013.1.5-2.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-cinder-doc@2013.1.5-2.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-cinder-0:2013.1.5-2.el6ost.noarch", "product": { "name": "openstack-cinder-0:2013.1.5-2.el6ost.noarch", "product_id": "openstack-cinder-0:2013.1.5-2.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-cinder@2013.1.5-2.el6ost?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openstack-cinder-0:2013.1.5-2.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-cinder-0:2013.1.5-2.el6ost.noarch" }, "product_reference": "openstack-cinder-0:2013.1.5-2.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-cinder-0:2013.1.5-2.el6ost.src as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-cinder-0:2013.1.5-2.el6ost.src" }, "product_reference": "openstack-cinder-0:2013.1.5-2.el6ost.src", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-cinder-doc-0:2013.1.5-2.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-cinder-doc-0:2013.1.5-2.el6ost.noarch" }, "product_reference": "openstack-cinder-doc-0:2013.1.5-2.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-glance-0:2013.1.5-1.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-glance-0:2013.1.5-1.el6ost.noarch" }, "product_reference": "openstack-glance-0:2013.1.5-1.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-glance-0:2013.1.5-1.el6ost.src as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-glance-0:2013.1.5-1.el6ost.src" }, "product_reference": "openstack-glance-0:2013.1.5-1.el6ost.src", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-glance-doc-0:2013.1.5-1.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-glance-doc-0:2013.1.5-1.el6ost.noarch" }, "product_reference": "openstack-glance-doc-0:2013.1.5-1.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-quantum-0:2013.1.5-1.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-quantum-0:2013.1.5-1.el6ost.noarch" }, "product_reference": "openstack-quantum-0:2013.1.5-1.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-quantum-0:2013.1.5-1.el6ost.src as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-quantum-0:2013.1.5-1.el6ost.src" }, "product_reference": "openstack-quantum-0:2013.1.5-1.el6ost.src", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-quantum-bigswitch-0:2013.1.5-1.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-quantum-bigswitch-0:2013.1.5-1.el6ost.noarch" }, "product_reference": "openstack-quantum-bigswitch-0:2013.1.5-1.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-quantum-brocade-0:2013.1.5-1.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-quantum-brocade-0:2013.1.5-1.el6ost.noarch" }, "product_reference": "openstack-quantum-brocade-0:2013.1.5-1.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-quantum-cisco-0:2013.1.5-1.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-quantum-cisco-0:2013.1.5-1.el6ost.noarch" }, "product_reference": "openstack-quantum-cisco-0:2013.1.5-1.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-quantum-hyperv-0:2013.1.5-1.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-quantum-hyperv-0:2013.1.5-1.el6ost.noarch" }, "product_reference": "openstack-quantum-hyperv-0:2013.1.5-1.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-quantum-linuxbridge-0:2013.1.5-1.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-quantum-linuxbridge-0:2013.1.5-1.el6ost.noarch" }, "product_reference": "openstack-quantum-linuxbridge-0:2013.1.5-1.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-quantum-metaplugin-0:2013.1.5-1.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-quantum-metaplugin-0:2013.1.5-1.el6ost.noarch" }, "product_reference": "openstack-quantum-metaplugin-0:2013.1.5-1.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-quantum-midonet-0:2013.1.5-1.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-quantum-midonet-0:2013.1.5-1.el6ost.noarch" }, "product_reference": "openstack-quantum-midonet-0:2013.1.5-1.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-quantum-nec-0:2013.1.5-1.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-quantum-nec-0:2013.1.5-1.el6ost.noarch" }, "product_reference": "openstack-quantum-nec-0:2013.1.5-1.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-quantum-nicira-0:2013.1.5-1.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-quantum-nicira-0:2013.1.5-1.el6ost.noarch" }, "product_reference": "openstack-quantum-nicira-0:2013.1.5-1.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-quantum-openvswitch-0:2013.1.5-1.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-quantum-openvswitch-0:2013.1.5-1.el6ost.noarch" }, "product_reference": "openstack-quantum-openvswitch-0:2013.1.5-1.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-quantum-plumgrid-0:2013.1.5-1.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-quantum-plumgrid-0:2013.1.5-1.el6ost.noarch" }, "product_reference": "openstack-quantum-plumgrid-0:2013.1.5-1.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-quantum-ryu-0:2013.1.5-1.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-quantum-ryu-0:2013.1.5-1.el6ost.noarch" }, "product_reference": "openstack-quantum-ryu-0:2013.1.5-1.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "python-cinder-0:2013.1.5-2.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:python-cinder-0:2013.1.5-2.el6ost.noarch" }, "product_reference": "python-cinder-0:2013.1.5-2.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "python-glance-0:2013.1.5-1.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:python-glance-0:2013.1.5-1.el6ost.noarch" }, "product_reference": "python-glance-0:2013.1.5-1.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "python-quantum-0:2013.1.5-1.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:python-quantum-0:2013.1.5-1.el6ost.noarch" }, "product_reference": "python-quantum-0:2013.1.5-1.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-img-rhev-2:0.12.1.2-2.415.el6_5.6.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:qemu-img-rhev-2:0.12.1.2-2.415.el6_5.6.x86_64" }, "product_reference": "qemu-img-rhev-2:0.12.1.2-2.415.el6_5.6.x86_64", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-2:0.12.1.2-2.415.el6_5.6.src as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:qemu-kvm-rhev-2:0.12.1.2-2.415.el6_5.6.src" }, "product_reference": "qemu-kvm-rhev-2:0.12.1.2-2.415.el6_5.6.src", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-2:0.12.1.2-2.415.el6_5.6.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:qemu-kvm-rhev-2:0.12.1.2-2.415.el6_5.6.x86_64" }, "product_reference": "qemu-kvm-rhev-2:0.12.1.2-2.415.el6_5.6.x86_64", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.415.el6_5.6.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.415.el6_5.6.x86_64" }, "product_reference": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.415.el6_5.6.x86_64", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-tools-2:0.12.1.2-2.415.el6_5.6.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:qemu-kvm-rhev-tools-2:0.12.1.2-2.415.el6_5.6.x86_64" }, "product_reference": "qemu-kvm-rhev-tools-2:0.12.1.2-2.415.el6_5.6.x86_64", "relates_to_product_reference": "6Server-Grizzly" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-6491", "discovery_date": "2014-01-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1059504" } ], "notes": [ { "category": "description", "text": "The python-qpid client (common/rpc/impl_qpid.py) in OpenStack Oslo before 2013.2 does not enforce SSL connections when qpid_protocol is set to ssl, which allows remote attackers to obtain sensitive information by sniffing the network.", "title": "Vulnerability description" }, { "category": "summary", "text": "nova: qpid SSL configuration", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-Grizzly:openstack-cinder-0:2013.1.5-2.el6ost.noarch", "6Server-Grizzly:openstack-cinder-0:2013.1.5-2.el6ost.src", "6Server-Grizzly:openstack-cinder-doc-0:2013.1.5-2.el6ost.noarch", "6Server-Grizzly:openstack-glance-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-glance-0:2013.1.5-1.el6ost.src", "6Server-Grizzly:openstack-glance-doc-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-0:2013.1.5-1.el6ost.src", "6Server-Grizzly:openstack-quantum-bigswitch-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-brocade-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-cisco-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-hyperv-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-linuxbridge-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-metaplugin-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-midonet-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-nec-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-nicira-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-openvswitch-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-plumgrid-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-ryu-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:python-cinder-0:2013.1.5-2.el6ost.noarch", "6Server-Grizzly:python-glance-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:python-quantum-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:qemu-img-rhev-2:0.12.1.2-2.415.el6_5.6.x86_64", "6Server-Grizzly:qemu-kvm-rhev-2:0.12.1.2-2.415.el6_5.6.src", "6Server-Grizzly:qemu-kvm-rhev-2:0.12.1.2-2.415.el6_5.6.x86_64", "6Server-Grizzly:qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.415.el6_5.6.x86_64", "6Server-Grizzly:qemu-kvm-rhev-tools-2:0.12.1.2-2.415.el6_5.6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-6491" }, { "category": "external", "summary": "RHBZ#1059504", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1059504" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-6491", "url": "https://www.cve.org/CVERecord?id=CVE-2013-6491" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-6491", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-6491" } ], "release_date": "2013-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-04-03T18:16:48+00:00", "details": "Before applying this update, ensure all previously released errata\nrelevant to your system have been applied.\n\nRed Hat Enterprise Linux OpenStack Platform 3 runs on the latest available version of Red Hat Enterprise Linux 6.\n\nThe Red Hat Enterprise Linux OpenStack Platform 3 Release Notes contain the\nfollowing:\n* An explanation of the way in which the provided components interact to form a working cloud computing environment.\n* Technology Previews, Recommended Practices, Known Issues and Deprecated Functionality.\n* The channels required for Red Hat Enterprise Linux OpenStack Platform 3, including which channels need to be enabled and disabled.\n\nThe Release Notes are available at:\nhttps://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux_OpenStack_Platform/3/html/Release_Notes/index.html\n\nThis update is available through the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "6Server-Grizzly:openstack-cinder-0:2013.1.5-2.el6ost.noarch", "6Server-Grizzly:openstack-cinder-0:2013.1.5-2.el6ost.src", "6Server-Grizzly:openstack-cinder-doc-0:2013.1.5-2.el6ost.noarch", "6Server-Grizzly:openstack-glance-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-glance-0:2013.1.5-1.el6ost.src", "6Server-Grizzly:openstack-glance-doc-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-0:2013.1.5-1.el6ost.src", "6Server-Grizzly:openstack-quantum-bigswitch-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-brocade-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-cisco-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-hyperv-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-linuxbridge-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-metaplugin-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-midonet-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-nec-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-nicira-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-openvswitch-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-plumgrid-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-ryu-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:python-cinder-0:2013.1.5-2.el6ost.noarch", "6Server-Grizzly:python-glance-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:python-quantum-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:qemu-img-rhev-2:0.12.1.2-2.415.el6_5.6.x86_64", "6Server-Grizzly:qemu-kvm-rhev-2:0.12.1.2-2.415.el6_5.6.src", "6Server-Grizzly:qemu-kvm-rhev-2:0.12.1.2-2.415.el6_5.6.x86_64", "6Server-Grizzly:qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.415.el6_5.6.x86_64", "6Server-Grizzly:qemu-kvm-rhev-tools-2:0.12.1.2-2.415.el6_5.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHBA-2014:0363" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Server-Grizzly:openstack-cinder-0:2013.1.5-2.el6ost.noarch", "6Server-Grizzly:openstack-cinder-0:2013.1.5-2.el6ost.src", "6Server-Grizzly:openstack-cinder-doc-0:2013.1.5-2.el6ost.noarch", "6Server-Grizzly:openstack-glance-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-glance-0:2013.1.5-1.el6ost.src", "6Server-Grizzly:openstack-glance-doc-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-0:2013.1.5-1.el6ost.src", "6Server-Grizzly:openstack-quantum-bigswitch-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-brocade-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-cisco-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-hyperv-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-linuxbridge-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-metaplugin-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-midonet-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-nec-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-nicira-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-openvswitch-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-plumgrid-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-ryu-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:python-cinder-0:2013.1.5-2.el6ost.noarch", "6Server-Grizzly:python-glance-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:python-quantum-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:qemu-img-rhev-2:0.12.1.2-2.415.el6_5.6.x86_64", "6Server-Grizzly:qemu-kvm-rhev-2:0.12.1.2-2.415.el6_5.6.src", "6Server-Grizzly:qemu-kvm-rhev-2:0.12.1.2-2.415.el6_5.6.x86_64", "6Server-Grizzly:qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.415.el6_5.6.x86_64", "6Server-Grizzly:qemu-kvm-rhev-tools-2:0.12.1.2-2.415.el6_5.6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nova: qpid SSL configuration" } ] }
rhsa-2014_0112
Vulnerability from csaf_redhat
Published
2014-01-30 19:58
Modified
2024-11-22 07:25
Summary
Red Hat Security Advisory: openstack-nova security and bug fix update
Notes
Topic
Updated openstack-nova packages that fix two security issues and three bugs
are now available for Red Hat Enterprise Linux OpenStack Platform 3.0.
The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.
Details
The openstack-nova packages provide OpenStack Compute (nova), which
provides services for provisioning, managing, and using virtual
machine instances.
It was discovered that enabling "qpid_protocol = ssl" in the nova.conf file
did not result in nova using SSL to communicate to Qpid. If Qpid was not
configured to enforce SSL this could lead to sensitive information being
sent unencrypted over the communication channel. (CVE-2013-6491)
A flaw was found in the way OpenStack Compute controlled the size of disk
images. An authenticated remote user could use malicious compressed qcow2
disk images to consume large amounts of disk space, potentially causing a
denial of service on the OpenStack Compute nodes. (CVE-2013-4463)
Red Hat would like to thank the OpenStack project for reporting
CVE-2013-4463. Upstream acknowledges Bernhard M. Wiedemann of SuSE as the
original reporter of this issue.
This update also fixes the following bugs:
* When using GroupAntiAffinityFilter, the scheduler was not filtering
instances in the group, which could cause an instance to not be scheduled
at all if a group was specified on boot. With this fix, groups are taken
into account and the instance is scheduled as expected. (BZ#1014948)
* If an exchange had not been created previously by a consumer, the
publisher would crash because it could not find the specified exchange.
This resulted from Qpid's direct publisher using the wrong exchange type
'Direct'. With this fix, the exchange type in the publisher has been
changed to 'direct'. (BZ#1042055)
* Unhandled errors in the Qpid consuming thread could kill it silently and
isolate the component from the rest of the system. To fix this, the
consuming thread has been made more resilient to errors by ensuring it does
not die on an unhandled error. Compute now logs the error and retries the
consuming thread. (BZ#1050213)
All openstack-nova users are advised to upgrade to these updated packages,
which contain backported patches to correct these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated openstack-nova packages that fix two security issues and three bugs\nare now available for Red Hat Enterprise Linux OpenStack Platform 3.0.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.", "title": "Topic" }, { "category": "general", "text": "The openstack-nova packages provide OpenStack Compute (nova), which\nprovides services for provisioning, managing, and using virtual\nmachine instances.\n\nIt was discovered that enabling \"qpid_protocol = ssl\" in the nova.conf file\ndid not result in nova using SSL to communicate to Qpid. If Qpid was not\nconfigured to enforce SSL this could lead to sensitive information being\nsent unencrypted over the communication channel. (CVE-2013-6491)\n\nA flaw was found in the way OpenStack Compute controlled the size of disk\nimages. An authenticated remote user could use malicious compressed qcow2\ndisk images to consume large amounts of disk space, potentially causing a\ndenial of service on the OpenStack Compute nodes. (CVE-2013-4463)\n\nRed Hat would like to thank the OpenStack project for reporting\nCVE-2013-4463. Upstream acknowledges Bernhard M. Wiedemann of SuSE as the\noriginal reporter of this issue.\n\nThis update also fixes the following bugs:\n\n* When using GroupAntiAffinityFilter, the scheduler was not filtering\ninstances in the group, which could cause an instance to not be scheduled\nat all if a group was specified on boot. With this fix, groups are taken\ninto account and the instance is scheduled as expected. (BZ#1014948)\n\n* If an exchange had not been created previously by a consumer, the\npublisher would crash because it could not find the specified exchange.\nThis resulted from Qpid\u0027s direct publisher using the wrong exchange type\n\u0027Direct\u0027. With this fix, the exchange type in the publisher has been\nchanged to \u0027direct\u0027. (BZ#1042055)\n\n* Unhandled errors in the Qpid consuming thread could kill it silently and\nisolate the component from the rest of the system. To fix this, the\nconsuming thread has been made more resilient to errors by ensuring it does\nnot die on an unhandled error. Compute now logs the error and retries the\nconsuming thread. (BZ#1050213)\n\nAll openstack-nova users are advised to upgrade to these updated packages,\nwhich contain backported patches to correct these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2014:0112", "url": "https://access.redhat.com/errata/RHSA-2014:0112" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "996766", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=996766" }, { "category": "external", "summary": "1014948", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1014948" }, { "category": "external", "summary": "1023239", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1023239" }, { "category": "external", "summary": "1044562", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1044562" }, { "category": "external", "summary": "1050213", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1050213" }, { "category": "external", "summary": "1059504", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1059504" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_0112.json" } ], "title": "Red Hat Security Advisory: openstack-nova security and bug fix update", "tracking": { "current_release_date": "2024-11-22T07:25:48+00:00", "generator": { "date": "2024-11-22T07:25:48+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2014:0112", "initial_release_date": "2014-01-30T19:58:47+00:00", "revision_history": [ { "date": "2014-01-30T19:58:47+00:00", "number": "1", "summary": "Initial version" }, { "date": "2014-01-30T19:58:47+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T07:25:48+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux OpenStack Platform 3.0", "product": { "name": "Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:3::el6" } } } ], "category": "product_family", "name": "Red Hat OpenStack Platform" }, { "branches": [ { "category": "product_version", "name": "openstack-nova-api-0:2013.1.4-4.el6ost.noarch", "product": { "name": "openstack-nova-api-0:2013.1.4-4.el6ost.noarch", "product_id": "openstack-nova-api-0:2013.1.4-4.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-nova-api@2013.1.4-4.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-nova-conductor-0:2013.1.4-4.el6ost.noarch", "product": { "name": "openstack-nova-conductor-0:2013.1.4-4.el6ost.noarch", "product_id": "openstack-nova-conductor-0:2013.1.4-4.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-nova-conductor@2013.1.4-4.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-nova-scheduler-0:2013.1.4-4.el6ost.noarch", "product": { "name": "openstack-nova-scheduler-0:2013.1.4-4.el6ost.noarch", "product_id": "openstack-nova-scheduler-0:2013.1.4-4.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-nova-scheduler@2013.1.4-4.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-nova-0:2013.1.4-4.el6ost.noarch", "product": { "name": "openstack-nova-0:2013.1.4-4.el6ost.noarch", "product_id": "openstack-nova-0:2013.1.4-4.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-nova@2013.1.4-4.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-nova-cells-0:2013.1.4-4.el6ost.noarch", "product": { "name": "openstack-nova-cells-0:2013.1.4-4.el6ost.noarch", "product_id": "openstack-nova-cells-0:2013.1.4-4.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-nova-cells@2013.1.4-4.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-nova-cert-0:2013.1.4-4.el6ost.noarch", "product": { "name": "openstack-nova-cert-0:2013.1.4-4.el6ost.noarch", "product_id": "openstack-nova-cert-0:2013.1.4-4.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-nova-cert@2013.1.4-4.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-nova-console-0:2013.1.4-4.el6ost.noarch", "product": { "name": "openstack-nova-console-0:2013.1.4-4.el6ost.noarch", "product_id": "openstack-nova-console-0:2013.1.4-4.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-nova-console@2013.1.4-4.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-nova-doc-0:2013.1.4-4.el6ost.noarch", "product": { "name": "openstack-nova-doc-0:2013.1.4-4.el6ost.noarch", "product_id": "openstack-nova-doc-0:2013.1.4-4.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-nova-doc@2013.1.4-4.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-nova-network-0:2013.1.4-4.el6ost.noarch", "product": { "name": "openstack-nova-network-0:2013.1.4-4.el6ost.noarch", "product_id": "openstack-nova-network-0:2013.1.4-4.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-nova-network@2013.1.4-4.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-nova-compute-0:2013.1.4-4.el6ost.noarch", "product": { "name": "openstack-nova-compute-0:2013.1.4-4.el6ost.noarch", "product_id": "openstack-nova-compute-0:2013.1.4-4.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-nova-compute@2013.1.4-4.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-nova-common-0:2013.1.4-4.el6ost.noarch", "product": { "name": "openstack-nova-common-0:2013.1.4-4.el6ost.noarch", "product_id": "openstack-nova-common-0:2013.1.4-4.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-nova-common@2013.1.4-4.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "python-nova-0:2013.1.4-4.el6ost.noarch", "product": { "name": "python-nova-0:2013.1.4-4.el6ost.noarch", "product_id": "python-nova-0:2013.1.4-4.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-nova@2013.1.4-4.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-nova-objectstore-0:2013.1.4-4.el6ost.noarch", "product": { "name": "openstack-nova-objectstore-0:2013.1.4-4.el6ost.noarch", "product_id": "openstack-nova-objectstore-0:2013.1.4-4.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-nova-objectstore@2013.1.4-4.el6ost?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "openstack-nova-0:2013.1.4-4.el6ost.src", "product": { "name": "openstack-nova-0:2013.1.4-4.el6ost.src", "product_id": "openstack-nova-0:2013.1.4-4.el6ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-nova@2013.1.4-4.el6ost?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openstack-nova-0:2013.1.4-4.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-nova-0:2013.1.4-4.el6ost.noarch" }, "product_reference": "openstack-nova-0:2013.1.4-4.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-nova-0:2013.1.4-4.el6ost.src as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-nova-0:2013.1.4-4.el6ost.src" }, "product_reference": "openstack-nova-0:2013.1.4-4.el6ost.src", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-nova-api-0:2013.1.4-4.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-nova-api-0:2013.1.4-4.el6ost.noarch" }, "product_reference": "openstack-nova-api-0:2013.1.4-4.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-nova-cells-0:2013.1.4-4.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-nova-cells-0:2013.1.4-4.el6ost.noarch" }, "product_reference": "openstack-nova-cells-0:2013.1.4-4.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-nova-cert-0:2013.1.4-4.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-nova-cert-0:2013.1.4-4.el6ost.noarch" }, "product_reference": "openstack-nova-cert-0:2013.1.4-4.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-nova-common-0:2013.1.4-4.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-nova-common-0:2013.1.4-4.el6ost.noarch" }, "product_reference": "openstack-nova-common-0:2013.1.4-4.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-nova-compute-0:2013.1.4-4.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-nova-compute-0:2013.1.4-4.el6ost.noarch" }, "product_reference": "openstack-nova-compute-0:2013.1.4-4.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-nova-conductor-0:2013.1.4-4.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-nova-conductor-0:2013.1.4-4.el6ost.noarch" }, "product_reference": "openstack-nova-conductor-0:2013.1.4-4.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-nova-console-0:2013.1.4-4.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-nova-console-0:2013.1.4-4.el6ost.noarch" }, "product_reference": "openstack-nova-console-0:2013.1.4-4.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-nova-doc-0:2013.1.4-4.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-nova-doc-0:2013.1.4-4.el6ost.noarch" }, "product_reference": "openstack-nova-doc-0:2013.1.4-4.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-nova-network-0:2013.1.4-4.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-nova-network-0:2013.1.4-4.el6ost.noarch" }, "product_reference": "openstack-nova-network-0:2013.1.4-4.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-nova-objectstore-0:2013.1.4-4.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-nova-objectstore-0:2013.1.4-4.el6ost.noarch" }, "product_reference": "openstack-nova-objectstore-0:2013.1.4-4.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-nova-scheduler-0:2013.1.4-4.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-nova-scheduler-0:2013.1.4-4.el6ost.noarch" }, "product_reference": "openstack-nova-scheduler-0:2013.1.4-4.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "python-nova-0:2013.1.4-4.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:python-nova-0:2013.1.4-4.el6ost.noarch" }, "product_reference": "python-nova-0:2013.1.4-4.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Thierry Carrez" ], "organization": "OpenStack project" }, { "names": [ "Bernhard M. Wiedemann" ], "organization": "SuSE", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2013-4463", "discovery_date": "2013-10-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1023239" } ], "notes": [ { "category": "description", "text": "OpenStack Compute (Nova) Folsom, Grizzly, and Havana does not properly verify the virtual size of a QCOW2 image, which allows local users to cause a denial of service (host file system disk consumption) via a compressed QCOW2 image. NOTE: this issue is due to an incomplete fix for CVE-2013-2096.", "title": "Vulnerability description" }, { "category": "summary", "text": "Nova: Compressed disk image DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "The Red Hat Security Response Team has rated this issue as having moderate security impact. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-Grizzly:openstack-nova-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-0:2013.1.4-4.el6ost.src", "6Server-Grizzly:openstack-nova-api-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-cells-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-cert-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-common-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-compute-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-conductor-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-console-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-doc-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-network-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-objectstore-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-scheduler-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:python-nova-0:2013.1.4-4.el6ost.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-4463" }, { "category": "external", "summary": "RHBZ#1023239", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1023239" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-4463", "url": "https://www.cve.org/CVERecord?id=CVE-2013-4463" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4463", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4463" } ], "release_date": "2013-10-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-01-30T19:58:47+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "6Server-Grizzly:openstack-nova-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-0:2013.1.4-4.el6ost.src", "6Server-Grizzly:openstack-nova-api-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-cells-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-cert-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-common-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-compute-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-conductor-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-console-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-doc-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-network-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-objectstore-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-scheduler-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:python-nova-0:2013.1.4-4.el6ost.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0112" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Server-Grizzly:openstack-nova-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-0:2013.1.4-4.el6ost.src", "6Server-Grizzly:openstack-nova-api-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-cells-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-cert-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-common-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-compute-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-conductor-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-console-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-doc-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-network-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-objectstore-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-scheduler-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:python-nova-0:2013.1.4-4.el6ost.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Nova: Compressed disk image DoS" }, { "cve": "CVE-2013-6491", "discovery_date": "2014-01-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1059504" } ], "notes": [ { "category": "description", "text": "The python-qpid client (common/rpc/impl_qpid.py) in OpenStack Oslo before 2013.2 does not enforce SSL connections when qpid_protocol is set to ssl, which allows remote attackers to obtain sensitive information by sniffing the network.", "title": "Vulnerability description" }, { "category": "summary", "text": "nova: qpid SSL configuration", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-Grizzly:openstack-nova-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-0:2013.1.4-4.el6ost.src", "6Server-Grizzly:openstack-nova-api-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-cells-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-cert-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-common-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-compute-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-conductor-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-console-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-doc-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-network-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-objectstore-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-scheduler-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:python-nova-0:2013.1.4-4.el6ost.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-6491" }, { "category": "external", "summary": "RHBZ#1059504", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1059504" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-6491", "url": "https://www.cve.org/CVERecord?id=CVE-2013-6491" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-6491", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-6491" } ], "release_date": "2013-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-01-30T19:58:47+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "6Server-Grizzly:openstack-nova-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-0:2013.1.4-4.el6ost.src", "6Server-Grizzly:openstack-nova-api-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-cells-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-cert-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-common-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-compute-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-conductor-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-console-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-doc-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-network-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-objectstore-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-scheduler-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:python-nova-0:2013.1.4-4.el6ost.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0112" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Server-Grizzly:openstack-nova-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-0:2013.1.4-4.el6ost.src", "6Server-Grizzly:openstack-nova-api-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-cells-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-cert-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-common-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-compute-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-conductor-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-console-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-doc-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-network-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-objectstore-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-scheduler-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:python-nova-0:2013.1.4-4.el6ost.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nova: qpid SSL configuration" } ] }
RHBA-2014:0363
Vulnerability from csaf_redhat
Published
2014-04-03 18:16
Modified
2024-11-22 07:25
Summary
Red Hat Bug Fix Advisory: Red Hat Enterprise Linux OpenStack Platform 3 Bug Fix and Enhancement Advisory
Notes
Topic
Updated packages for Red Hat Enterprise Linux OpenStack Platform 3.0 (Grizzly), which fix bugs and add enhancements, are now available.
Details
Red Hat Enterprise Linux OpenStack Platform provides the facilities for building a private or public infrastructure-as-a-service (IaaS) cloud running on commonly available physical hardware. Services provided by these packages include:
* OpenStack Block Storage service ("cinder").
* OpenStack Compute service ("nova").
* OpenStack Dashboard ("horizon").
* OpenStack Image service ("glance").
* OpenStack Identity ("keystone").
* OpenStack Networking service ("neutron").
* OpenStack Object Storage service ("swift").
* OpenStack Orchestration service ("heat") - Technology Preview.
* OpenStack Telemetry service ("ceilometer") - Technology Preview.
Red Hat Enterprise Linux OpenStack Platform also includes these supporting technologies:
* Foreman OpenStack Manager, a utility for deploying enterprise-level OpenStack clouds.
* PackStack, a utility for rapidly deploying proof of concept OpenStack clouds.
* Open vSwitch, an implementation of the OpenFlow protocol for remote per flow control of network traffic.
For information on the scope and support implications of the Technology Preview designation applied to some included components refer to:
https://access.redhat.com/support/offerings/techpreview/
These updated packages also fix various bugs. Documentation for these bug fixes is available in the Technical Notes document:
https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux_OpenStack_Platform/3/html/Technical_Notes/index.html
This erratum includes rebases for core OpenStack services to the 2013.1.5 stable branch release.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated packages for Red Hat Enterprise Linux OpenStack Platform 3.0 (Grizzly), which fix bugs and add enhancements, are now available.", "title": "Topic" }, { "category": "general", "text": "Red Hat Enterprise Linux OpenStack Platform provides the facilities for building a private or public infrastructure-as-a-service (IaaS) cloud running on commonly available physical hardware. Services provided by these packages include:\n* OpenStack Block Storage service (\"cinder\").\n* OpenStack Compute service (\"nova\").\n* OpenStack Dashboard (\"horizon\").\n* OpenStack Image service (\"glance\").\n* OpenStack Identity (\"keystone\").\n* OpenStack Networking service (\"neutron\").\n* OpenStack Object Storage service (\"swift\").\n* OpenStack Orchestration service (\"heat\") - Technology Preview.\n* OpenStack Telemetry service (\"ceilometer\") - Technology Preview.\n\nRed Hat Enterprise Linux OpenStack Platform also includes these supporting technologies:\n* Foreman OpenStack Manager, a utility for deploying enterprise-level OpenStack clouds.\n* PackStack, a utility for rapidly deploying proof of concept OpenStack clouds.\n* Open vSwitch, an implementation of the OpenFlow protocol for remote per flow control of network traffic.\n\nFor information on the scope and support implications of the Technology Preview designation applied to some included components refer to:\nhttps://access.redhat.com/support/offerings/techpreview/\n\nThese updated packages also fix various bugs. Documentation for these bug fixes is available in the Technical Notes document:\nhttps://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux_OpenStack_Platform/3/html/Technical_Notes/index.html\n\nThis erratum includes rebases for core OpenStack services to the 2013.1.5 stable branch release.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHBA-2014:0363", "url": "https://access.redhat.com/errata/RHBA-2014:0363" }, { "category": "external", "summary": "1050214", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1050214" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhba-2014_0363.json" } ], "title": "Red Hat Bug Fix Advisory: Red Hat Enterprise Linux OpenStack Platform 3 Bug Fix and Enhancement Advisory", "tracking": { "current_release_date": "2024-11-22T07:25:52+00:00", "generator": { "date": "2024-11-22T07:25:52+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHBA-2014:0363", "initial_release_date": "2014-04-03T18:16:48+00:00", "revision_history": [ { "date": "2014-04-03T18:16:48+00:00", "number": "1", "summary": "Initial version" }, { "date": "2014-04-03T18:16:48+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T07:25:52+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux OpenStack Platform 3.0", "product": { "name": "Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:3::el6" } } } ], "category": "product_family", "name": "Red Hat OpenStack Platform" }, { "branches": [ { "category": "product_version", "name": "qemu-kvm-rhev-tools-2:0.12.1.2-2.415.el6_5.6.x86_64", "product": { "name": "qemu-kvm-rhev-tools-2:0.12.1.2-2.415.el6_5.6.x86_64", "product_id": "qemu-kvm-rhev-tools-2:0.12.1.2-2.415.el6_5.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev-tools@0.12.1.2-2.415.el6_5.6?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.415.el6_5.6.x86_64", "product": { "name": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.415.el6_5.6.x86_64", "product_id": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.415.el6_5.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev-debuginfo@0.12.1.2-2.415.el6_5.6?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-kvm-rhev-2:0.12.1.2-2.415.el6_5.6.x86_64", "product": { "name": "qemu-kvm-rhev-2:0.12.1.2-2.415.el6_5.6.x86_64", "product_id": "qemu-kvm-rhev-2:0.12.1.2-2.415.el6_5.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev@0.12.1.2-2.415.el6_5.6?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "qemu-img-rhev-2:0.12.1.2-2.415.el6_5.6.x86_64", "product": { "name": "qemu-img-rhev-2:0.12.1.2-2.415.el6_5.6.x86_64", "product_id": "qemu-img-rhev-2:0.12.1.2-2.415.el6_5.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-img-rhev@0.12.1.2-2.415.el6_5.6?arch=x86_64\u0026epoch=2" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "qemu-kvm-rhev-2:0.12.1.2-2.415.el6_5.6.src", "product": { "name": "qemu-kvm-rhev-2:0.12.1.2-2.415.el6_5.6.src", "product_id": "qemu-kvm-rhev-2:0.12.1.2-2.415.el6_5.6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/qemu-kvm-rhev@0.12.1.2-2.415.el6_5.6?arch=src\u0026epoch=2" } } }, { "category": "product_version", "name": "openstack-quantum-0:2013.1.5-1.el6ost.src", "product": { "name": "openstack-quantum-0:2013.1.5-1.el6ost.src", "product_id": "openstack-quantum-0:2013.1.5-1.el6ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-quantum@2013.1.5-1.el6ost?arch=src" } } }, { "category": "product_version", "name": "openstack-glance-0:2013.1.5-1.el6ost.src", "product": { "name": "openstack-glance-0:2013.1.5-1.el6ost.src", "product_id": "openstack-glance-0:2013.1.5-1.el6ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-glance@2013.1.5-1.el6ost?arch=src" } } }, { "category": "product_version", "name": "openstack-cinder-0:2013.1.5-2.el6ost.src", "product": { "name": "openstack-cinder-0:2013.1.5-2.el6ost.src", "product_id": "openstack-cinder-0:2013.1.5-2.el6ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-cinder@2013.1.5-2.el6ost?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openstack-quantum-0:2013.1.5-1.el6ost.noarch", "product": { "name": "openstack-quantum-0:2013.1.5-1.el6ost.noarch", "product_id": "openstack-quantum-0:2013.1.5-1.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-quantum@2013.1.5-1.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "python-quantum-0:2013.1.5-1.el6ost.noarch", "product": { "name": "python-quantum-0:2013.1.5-1.el6ost.noarch", "product_id": "python-quantum-0:2013.1.5-1.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-quantum@2013.1.5-1.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-quantum-cisco-0:2013.1.5-1.el6ost.noarch", "product": { "name": "openstack-quantum-cisco-0:2013.1.5-1.el6ost.noarch", "product_id": "openstack-quantum-cisco-0:2013.1.5-1.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-quantum-cisco@2013.1.5-1.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-quantum-ryu-0:2013.1.5-1.el6ost.noarch", "product": { "name": "openstack-quantum-ryu-0:2013.1.5-1.el6ost.noarch", "product_id": "openstack-quantum-ryu-0:2013.1.5-1.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-quantum-ryu@2013.1.5-1.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-quantum-midonet-0:2013.1.5-1.el6ost.noarch", "product": { "name": "openstack-quantum-midonet-0:2013.1.5-1.el6ost.noarch", "product_id": "openstack-quantum-midonet-0:2013.1.5-1.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-quantum-midonet@2013.1.5-1.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-quantum-bigswitch-0:2013.1.5-1.el6ost.noarch", "product": { "name": "openstack-quantum-bigswitch-0:2013.1.5-1.el6ost.noarch", "product_id": "openstack-quantum-bigswitch-0:2013.1.5-1.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-quantum-bigswitch@2013.1.5-1.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-quantum-hyperv-0:2013.1.5-1.el6ost.noarch", "product": { "name": "openstack-quantum-hyperv-0:2013.1.5-1.el6ost.noarch", "product_id": "openstack-quantum-hyperv-0:2013.1.5-1.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-quantum-hyperv@2013.1.5-1.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-quantum-plumgrid-0:2013.1.5-1.el6ost.noarch", "product": { "name": "openstack-quantum-plumgrid-0:2013.1.5-1.el6ost.noarch", "product_id": "openstack-quantum-plumgrid-0:2013.1.5-1.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-quantum-plumgrid@2013.1.5-1.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-quantum-brocade-0:2013.1.5-1.el6ost.noarch", "product": { "name": "openstack-quantum-brocade-0:2013.1.5-1.el6ost.noarch", "product_id": "openstack-quantum-brocade-0:2013.1.5-1.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-quantum-brocade@2013.1.5-1.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-quantum-linuxbridge-0:2013.1.5-1.el6ost.noarch", "product": { "name": "openstack-quantum-linuxbridge-0:2013.1.5-1.el6ost.noarch", "product_id": "openstack-quantum-linuxbridge-0:2013.1.5-1.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-quantum-linuxbridge@2013.1.5-1.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-quantum-nicira-0:2013.1.5-1.el6ost.noarch", "product": { "name": "openstack-quantum-nicira-0:2013.1.5-1.el6ost.noarch", "product_id": "openstack-quantum-nicira-0:2013.1.5-1.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-quantum-nicira@2013.1.5-1.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-quantum-metaplugin-0:2013.1.5-1.el6ost.noarch", "product": { "name": "openstack-quantum-metaplugin-0:2013.1.5-1.el6ost.noarch", "product_id": "openstack-quantum-metaplugin-0:2013.1.5-1.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-quantum-metaplugin@2013.1.5-1.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-quantum-openvswitch-0:2013.1.5-1.el6ost.noarch", "product": { "name": "openstack-quantum-openvswitch-0:2013.1.5-1.el6ost.noarch", "product_id": "openstack-quantum-openvswitch-0:2013.1.5-1.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-quantum-openvswitch@2013.1.5-1.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-quantum-nec-0:2013.1.5-1.el6ost.noarch", "product": { "name": "openstack-quantum-nec-0:2013.1.5-1.el6ost.noarch", "product_id": "openstack-quantum-nec-0:2013.1.5-1.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-quantum-nec@2013.1.5-1.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-glance-doc-0:2013.1.5-1.el6ost.noarch", "product": { "name": "openstack-glance-doc-0:2013.1.5-1.el6ost.noarch", "product_id": "openstack-glance-doc-0:2013.1.5-1.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-glance-doc@2013.1.5-1.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "python-glance-0:2013.1.5-1.el6ost.noarch", "product": { "name": "python-glance-0:2013.1.5-1.el6ost.noarch", "product_id": "python-glance-0:2013.1.5-1.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-glance@2013.1.5-1.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-glance-0:2013.1.5-1.el6ost.noarch", "product": { "name": "openstack-glance-0:2013.1.5-1.el6ost.noarch", "product_id": "openstack-glance-0:2013.1.5-1.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-glance@2013.1.5-1.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "python-cinder-0:2013.1.5-2.el6ost.noarch", "product": { "name": "python-cinder-0:2013.1.5-2.el6ost.noarch", "product_id": "python-cinder-0:2013.1.5-2.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-cinder@2013.1.5-2.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-cinder-doc-0:2013.1.5-2.el6ost.noarch", "product": { "name": "openstack-cinder-doc-0:2013.1.5-2.el6ost.noarch", "product_id": "openstack-cinder-doc-0:2013.1.5-2.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-cinder-doc@2013.1.5-2.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-cinder-0:2013.1.5-2.el6ost.noarch", "product": { "name": "openstack-cinder-0:2013.1.5-2.el6ost.noarch", "product_id": "openstack-cinder-0:2013.1.5-2.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-cinder@2013.1.5-2.el6ost?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openstack-cinder-0:2013.1.5-2.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-cinder-0:2013.1.5-2.el6ost.noarch" }, "product_reference": "openstack-cinder-0:2013.1.5-2.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-cinder-0:2013.1.5-2.el6ost.src as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-cinder-0:2013.1.5-2.el6ost.src" }, "product_reference": "openstack-cinder-0:2013.1.5-2.el6ost.src", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-cinder-doc-0:2013.1.5-2.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-cinder-doc-0:2013.1.5-2.el6ost.noarch" }, "product_reference": "openstack-cinder-doc-0:2013.1.5-2.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-glance-0:2013.1.5-1.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-glance-0:2013.1.5-1.el6ost.noarch" }, "product_reference": "openstack-glance-0:2013.1.5-1.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-glance-0:2013.1.5-1.el6ost.src as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-glance-0:2013.1.5-1.el6ost.src" }, "product_reference": "openstack-glance-0:2013.1.5-1.el6ost.src", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-glance-doc-0:2013.1.5-1.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-glance-doc-0:2013.1.5-1.el6ost.noarch" }, "product_reference": "openstack-glance-doc-0:2013.1.5-1.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-quantum-0:2013.1.5-1.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-quantum-0:2013.1.5-1.el6ost.noarch" }, "product_reference": "openstack-quantum-0:2013.1.5-1.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-quantum-0:2013.1.5-1.el6ost.src as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-quantum-0:2013.1.5-1.el6ost.src" }, "product_reference": "openstack-quantum-0:2013.1.5-1.el6ost.src", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-quantum-bigswitch-0:2013.1.5-1.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-quantum-bigswitch-0:2013.1.5-1.el6ost.noarch" }, "product_reference": "openstack-quantum-bigswitch-0:2013.1.5-1.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-quantum-brocade-0:2013.1.5-1.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-quantum-brocade-0:2013.1.5-1.el6ost.noarch" }, "product_reference": "openstack-quantum-brocade-0:2013.1.5-1.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-quantum-cisco-0:2013.1.5-1.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-quantum-cisco-0:2013.1.5-1.el6ost.noarch" }, "product_reference": "openstack-quantum-cisco-0:2013.1.5-1.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-quantum-hyperv-0:2013.1.5-1.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-quantum-hyperv-0:2013.1.5-1.el6ost.noarch" }, "product_reference": "openstack-quantum-hyperv-0:2013.1.5-1.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-quantum-linuxbridge-0:2013.1.5-1.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-quantum-linuxbridge-0:2013.1.5-1.el6ost.noarch" }, "product_reference": "openstack-quantum-linuxbridge-0:2013.1.5-1.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-quantum-metaplugin-0:2013.1.5-1.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-quantum-metaplugin-0:2013.1.5-1.el6ost.noarch" }, "product_reference": "openstack-quantum-metaplugin-0:2013.1.5-1.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-quantum-midonet-0:2013.1.5-1.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-quantum-midonet-0:2013.1.5-1.el6ost.noarch" }, "product_reference": "openstack-quantum-midonet-0:2013.1.5-1.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-quantum-nec-0:2013.1.5-1.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-quantum-nec-0:2013.1.5-1.el6ost.noarch" }, "product_reference": "openstack-quantum-nec-0:2013.1.5-1.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-quantum-nicira-0:2013.1.5-1.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-quantum-nicira-0:2013.1.5-1.el6ost.noarch" }, "product_reference": "openstack-quantum-nicira-0:2013.1.5-1.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-quantum-openvswitch-0:2013.1.5-1.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-quantum-openvswitch-0:2013.1.5-1.el6ost.noarch" }, "product_reference": "openstack-quantum-openvswitch-0:2013.1.5-1.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-quantum-plumgrid-0:2013.1.5-1.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-quantum-plumgrid-0:2013.1.5-1.el6ost.noarch" }, "product_reference": "openstack-quantum-plumgrid-0:2013.1.5-1.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-quantum-ryu-0:2013.1.5-1.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-quantum-ryu-0:2013.1.5-1.el6ost.noarch" }, "product_reference": "openstack-quantum-ryu-0:2013.1.5-1.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "python-cinder-0:2013.1.5-2.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:python-cinder-0:2013.1.5-2.el6ost.noarch" }, "product_reference": "python-cinder-0:2013.1.5-2.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "python-glance-0:2013.1.5-1.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:python-glance-0:2013.1.5-1.el6ost.noarch" }, "product_reference": "python-glance-0:2013.1.5-1.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "python-quantum-0:2013.1.5-1.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:python-quantum-0:2013.1.5-1.el6ost.noarch" }, "product_reference": "python-quantum-0:2013.1.5-1.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-img-rhev-2:0.12.1.2-2.415.el6_5.6.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:qemu-img-rhev-2:0.12.1.2-2.415.el6_5.6.x86_64" }, "product_reference": "qemu-img-rhev-2:0.12.1.2-2.415.el6_5.6.x86_64", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-2:0.12.1.2-2.415.el6_5.6.src as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:qemu-kvm-rhev-2:0.12.1.2-2.415.el6_5.6.src" }, "product_reference": "qemu-kvm-rhev-2:0.12.1.2-2.415.el6_5.6.src", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-2:0.12.1.2-2.415.el6_5.6.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:qemu-kvm-rhev-2:0.12.1.2-2.415.el6_5.6.x86_64" }, "product_reference": "qemu-kvm-rhev-2:0.12.1.2-2.415.el6_5.6.x86_64", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.415.el6_5.6.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.415.el6_5.6.x86_64" }, "product_reference": "qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.415.el6_5.6.x86_64", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "qemu-kvm-rhev-tools-2:0.12.1.2-2.415.el6_5.6.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:qemu-kvm-rhev-tools-2:0.12.1.2-2.415.el6_5.6.x86_64" }, "product_reference": "qemu-kvm-rhev-tools-2:0.12.1.2-2.415.el6_5.6.x86_64", "relates_to_product_reference": "6Server-Grizzly" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-6491", "discovery_date": "2014-01-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1059504" } ], "notes": [ { "category": "description", "text": "The python-qpid client (common/rpc/impl_qpid.py) in OpenStack Oslo before 2013.2 does not enforce SSL connections when qpid_protocol is set to ssl, which allows remote attackers to obtain sensitive information by sniffing the network.", "title": "Vulnerability description" }, { "category": "summary", "text": "nova: qpid SSL configuration", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-Grizzly:openstack-cinder-0:2013.1.5-2.el6ost.noarch", "6Server-Grizzly:openstack-cinder-0:2013.1.5-2.el6ost.src", "6Server-Grizzly:openstack-cinder-doc-0:2013.1.5-2.el6ost.noarch", "6Server-Grizzly:openstack-glance-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-glance-0:2013.1.5-1.el6ost.src", "6Server-Grizzly:openstack-glance-doc-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-0:2013.1.5-1.el6ost.src", "6Server-Grizzly:openstack-quantum-bigswitch-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-brocade-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-cisco-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-hyperv-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-linuxbridge-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-metaplugin-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-midonet-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-nec-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-nicira-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-openvswitch-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-plumgrid-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-ryu-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:python-cinder-0:2013.1.5-2.el6ost.noarch", "6Server-Grizzly:python-glance-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:python-quantum-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:qemu-img-rhev-2:0.12.1.2-2.415.el6_5.6.x86_64", "6Server-Grizzly:qemu-kvm-rhev-2:0.12.1.2-2.415.el6_5.6.src", "6Server-Grizzly:qemu-kvm-rhev-2:0.12.1.2-2.415.el6_5.6.x86_64", "6Server-Grizzly:qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.415.el6_5.6.x86_64", "6Server-Grizzly:qemu-kvm-rhev-tools-2:0.12.1.2-2.415.el6_5.6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-6491" }, { "category": "external", "summary": "RHBZ#1059504", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1059504" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-6491", "url": "https://www.cve.org/CVERecord?id=CVE-2013-6491" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-6491", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-6491" } ], "release_date": "2013-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-04-03T18:16:48+00:00", "details": "Before applying this update, ensure all previously released errata\nrelevant to your system have been applied.\n\nRed Hat Enterprise Linux OpenStack Platform 3 runs on the latest available version of Red Hat Enterprise Linux 6.\n\nThe Red Hat Enterprise Linux OpenStack Platform 3 Release Notes contain the\nfollowing:\n* An explanation of the way in which the provided components interact to form a working cloud computing environment.\n* Technology Previews, Recommended Practices, Known Issues and Deprecated Functionality.\n* The channels required for Red Hat Enterprise Linux OpenStack Platform 3, including which channels need to be enabled and disabled.\n\nThe Release Notes are available at:\nhttps://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux_OpenStack_Platform/3/html/Release_Notes/index.html\n\nThis update is available through the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "6Server-Grizzly:openstack-cinder-0:2013.1.5-2.el6ost.noarch", "6Server-Grizzly:openstack-cinder-0:2013.1.5-2.el6ost.src", "6Server-Grizzly:openstack-cinder-doc-0:2013.1.5-2.el6ost.noarch", "6Server-Grizzly:openstack-glance-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-glance-0:2013.1.5-1.el6ost.src", "6Server-Grizzly:openstack-glance-doc-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-0:2013.1.5-1.el6ost.src", "6Server-Grizzly:openstack-quantum-bigswitch-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-brocade-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-cisco-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-hyperv-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-linuxbridge-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-metaplugin-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-midonet-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-nec-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-nicira-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-openvswitch-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-plumgrid-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-ryu-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:python-cinder-0:2013.1.5-2.el6ost.noarch", "6Server-Grizzly:python-glance-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:python-quantum-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:qemu-img-rhev-2:0.12.1.2-2.415.el6_5.6.x86_64", "6Server-Grizzly:qemu-kvm-rhev-2:0.12.1.2-2.415.el6_5.6.src", "6Server-Grizzly:qemu-kvm-rhev-2:0.12.1.2-2.415.el6_5.6.x86_64", "6Server-Grizzly:qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.415.el6_5.6.x86_64", "6Server-Grizzly:qemu-kvm-rhev-tools-2:0.12.1.2-2.415.el6_5.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHBA-2014:0363" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Server-Grizzly:openstack-cinder-0:2013.1.5-2.el6ost.noarch", "6Server-Grizzly:openstack-cinder-0:2013.1.5-2.el6ost.src", "6Server-Grizzly:openstack-cinder-doc-0:2013.1.5-2.el6ost.noarch", "6Server-Grizzly:openstack-glance-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-glance-0:2013.1.5-1.el6ost.src", "6Server-Grizzly:openstack-glance-doc-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-0:2013.1.5-1.el6ost.src", "6Server-Grizzly:openstack-quantum-bigswitch-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-brocade-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-cisco-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-hyperv-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-linuxbridge-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-metaplugin-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-midonet-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-nec-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-nicira-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-openvswitch-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-plumgrid-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:openstack-quantum-ryu-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:python-cinder-0:2013.1.5-2.el6ost.noarch", "6Server-Grizzly:python-glance-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:python-quantum-0:2013.1.5-1.el6ost.noarch", "6Server-Grizzly:qemu-img-rhev-2:0.12.1.2-2.415.el6_5.6.x86_64", "6Server-Grizzly:qemu-kvm-rhev-2:0.12.1.2-2.415.el6_5.6.src", "6Server-Grizzly:qemu-kvm-rhev-2:0.12.1.2-2.415.el6_5.6.x86_64", "6Server-Grizzly:qemu-kvm-rhev-debuginfo-2:0.12.1.2-2.415.el6_5.6.x86_64", "6Server-Grizzly:qemu-kvm-rhev-tools-2:0.12.1.2-2.415.el6_5.6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nova: qpid SSL configuration" } ] }
rhsa-2014:0112
Vulnerability from csaf_redhat
Published
2014-01-30 19:58
Modified
2024-11-22 07:25
Summary
Red Hat Security Advisory: openstack-nova security and bug fix update
Notes
Topic
Updated openstack-nova packages that fix two security issues and three bugs
are now available for Red Hat Enterprise Linux OpenStack Platform 3.0.
The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.
Details
The openstack-nova packages provide OpenStack Compute (nova), which
provides services for provisioning, managing, and using virtual
machine instances.
It was discovered that enabling "qpid_protocol = ssl" in the nova.conf file
did not result in nova using SSL to communicate to Qpid. If Qpid was not
configured to enforce SSL this could lead to sensitive information being
sent unencrypted over the communication channel. (CVE-2013-6491)
A flaw was found in the way OpenStack Compute controlled the size of disk
images. An authenticated remote user could use malicious compressed qcow2
disk images to consume large amounts of disk space, potentially causing a
denial of service on the OpenStack Compute nodes. (CVE-2013-4463)
Red Hat would like to thank the OpenStack project for reporting
CVE-2013-4463. Upstream acknowledges Bernhard M. Wiedemann of SuSE as the
original reporter of this issue.
This update also fixes the following bugs:
* When using GroupAntiAffinityFilter, the scheduler was not filtering
instances in the group, which could cause an instance to not be scheduled
at all if a group was specified on boot. With this fix, groups are taken
into account and the instance is scheduled as expected. (BZ#1014948)
* If an exchange had not been created previously by a consumer, the
publisher would crash because it could not find the specified exchange.
This resulted from Qpid's direct publisher using the wrong exchange type
'Direct'. With this fix, the exchange type in the publisher has been
changed to 'direct'. (BZ#1042055)
* Unhandled errors in the Qpid consuming thread could kill it silently and
isolate the component from the rest of the system. To fix this, the
consuming thread has been made more resilient to errors by ensuring it does
not die on an unhandled error. Compute now logs the error and retries the
consuming thread. (BZ#1050213)
All openstack-nova users are advised to upgrade to these updated packages,
which contain backported patches to correct these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated openstack-nova packages that fix two security issues and three bugs\nare now available for Red Hat Enterprise Linux OpenStack Platform 3.0.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.", "title": "Topic" }, { "category": "general", "text": "The openstack-nova packages provide OpenStack Compute (nova), which\nprovides services for provisioning, managing, and using virtual\nmachine instances.\n\nIt was discovered that enabling \"qpid_protocol = ssl\" in the nova.conf file\ndid not result in nova using SSL to communicate to Qpid. If Qpid was not\nconfigured to enforce SSL this could lead to sensitive information being\nsent unencrypted over the communication channel. (CVE-2013-6491)\n\nA flaw was found in the way OpenStack Compute controlled the size of disk\nimages. An authenticated remote user could use malicious compressed qcow2\ndisk images to consume large amounts of disk space, potentially causing a\ndenial of service on the OpenStack Compute nodes. (CVE-2013-4463)\n\nRed Hat would like to thank the OpenStack project for reporting\nCVE-2013-4463. Upstream acknowledges Bernhard M. Wiedemann of SuSE as the\noriginal reporter of this issue.\n\nThis update also fixes the following bugs:\n\n* When using GroupAntiAffinityFilter, the scheduler was not filtering\ninstances in the group, which could cause an instance to not be scheduled\nat all if a group was specified on boot. With this fix, groups are taken\ninto account and the instance is scheduled as expected. (BZ#1014948)\n\n* If an exchange had not been created previously by a consumer, the\npublisher would crash because it could not find the specified exchange.\nThis resulted from Qpid\u0027s direct publisher using the wrong exchange type\n\u0027Direct\u0027. With this fix, the exchange type in the publisher has been\nchanged to \u0027direct\u0027. (BZ#1042055)\n\n* Unhandled errors in the Qpid consuming thread could kill it silently and\nisolate the component from the rest of the system. To fix this, the\nconsuming thread has been made more resilient to errors by ensuring it does\nnot die on an unhandled error. Compute now logs the error and retries the\nconsuming thread. (BZ#1050213)\n\nAll openstack-nova users are advised to upgrade to these updated packages,\nwhich contain backported patches to correct these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2014:0112", "url": "https://access.redhat.com/errata/RHSA-2014:0112" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "996766", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=996766" }, { "category": "external", "summary": "1014948", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1014948" }, { "category": "external", "summary": "1023239", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1023239" }, { "category": "external", "summary": "1044562", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1044562" }, { "category": "external", "summary": "1050213", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1050213" }, { "category": "external", "summary": "1059504", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1059504" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_0112.json" } ], "title": "Red Hat Security Advisory: openstack-nova security and bug fix update", "tracking": { "current_release_date": "2024-11-22T07:25:48+00:00", "generator": { "date": "2024-11-22T07:25:48+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2014:0112", "initial_release_date": "2014-01-30T19:58:47+00:00", "revision_history": [ { "date": "2014-01-30T19:58:47+00:00", "number": "1", "summary": "Initial version" }, { "date": "2014-01-30T19:58:47+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T07:25:48+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux OpenStack Platform 3.0", "product": { "name": "Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:3::el6" } } } ], "category": "product_family", "name": "Red Hat OpenStack Platform" }, { "branches": [ { "category": "product_version", "name": "openstack-nova-api-0:2013.1.4-4.el6ost.noarch", "product": { "name": "openstack-nova-api-0:2013.1.4-4.el6ost.noarch", "product_id": "openstack-nova-api-0:2013.1.4-4.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-nova-api@2013.1.4-4.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-nova-conductor-0:2013.1.4-4.el6ost.noarch", "product": { "name": "openstack-nova-conductor-0:2013.1.4-4.el6ost.noarch", "product_id": "openstack-nova-conductor-0:2013.1.4-4.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-nova-conductor@2013.1.4-4.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-nova-scheduler-0:2013.1.4-4.el6ost.noarch", "product": { "name": "openstack-nova-scheduler-0:2013.1.4-4.el6ost.noarch", "product_id": "openstack-nova-scheduler-0:2013.1.4-4.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-nova-scheduler@2013.1.4-4.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-nova-0:2013.1.4-4.el6ost.noarch", "product": { "name": "openstack-nova-0:2013.1.4-4.el6ost.noarch", "product_id": "openstack-nova-0:2013.1.4-4.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-nova@2013.1.4-4.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-nova-cells-0:2013.1.4-4.el6ost.noarch", "product": { "name": "openstack-nova-cells-0:2013.1.4-4.el6ost.noarch", "product_id": "openstack-nova-cells-0:2013.1.4-4.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-nova-cells@2013.1.4-4.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-nova-cert-0:2013.1.4-4.el6ost.noarch", "product": { "name": "openstack-nova-cert-0:2013.1.4-4.el6ost.noarch", "product_id": "openstack-nova-cert-0:2013.1.4-4.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-nova-cert@2013.1.4-4.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-nova-console-0:2013.1.4-4.el6ost.noarch", "product": { "name": "openstack-nova-console-0:2013.1.4-4.el6ost.noarch", "product_id": "openstack-nova-console-0:2013.1.4-4.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-nova-console@2013.1.4-4.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-nova-doc-0:2013.1.4-4.el6ost.noarch", "product": { "name": "openstack-nova-doc-0:2013.1.4-4.el6ost.noarch", "product_id": "openstack-nova-doc-0:2013.1.4-4.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-nova-doc@2013.1.4-4.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-nova-network-0:2013.1.4-4.el6ost.noarch", "product": { "name": "openstack-nova-network-0:2013.1.4-4.el6ost.noarch", "product_id": "openstack-nova-network-0:2013.1.4-4.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-nova-network@2013.1.4-4.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-nova-compute-0:2013.1.4-4.el6ost.noarch", "product": { "name": "openstack-nova-compute-0:2013.1.4-4.el6ost.noarch", "product_id": "openstack-nova-compute-0:2013.1.4-4.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-nova-compute@2013.1.4-4.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-nova-common-0:2013.1.4-4.el6ost.noarch", "product": { "name": "openstack-nova-common-0:2013.1.4-4.el6ost.noarch", "product_id": "openstack-nova-common-0:2013.1.4-4.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-nova-common@2013.1.4-4.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "python-nova-0:2013.1.4-4.el6ost.noarch", "product": { "name": "python-nova-0:2013.1.4-4.el6ost.noarch", "product_id": "python-nova-0:2013.1.4-4.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-nova@2013.1.4-4.el6ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-nova-objectstore-0:2013.1.4-4.el6ost.noarch", "product": { "name": "openstack-nova-objectstore-0:2013.1.4-4.el6ost.noarch", "product_id": "openstack-nova-objectstore-0:2013.1.4-4.el6ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-nova-objectstore@2013.1.4-4.el6ost?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "openstack-nova-0:2013.1.4-4.el6ost.src", "product": { "name": "openstack-nova-0:2013.1.4-4.el6ost.src", "product_id": "openstack-nova-0:2013.1.4-4.el6ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-nova@2013.1.4-4.el6ost?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openstack-nova-0:2013.1.4-4.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-nova-0:2013.1.4-4.el6ost.noarch" }, "product_reference": "openstack-nova-0:2013.1.4-4.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-nova-0:2013.1.4-4.el6ost.src as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-nova-0:2013.1.4-4.el6ost.src" }, "product_reference": "openstack-nova-0:2013.1.4-4.el6ost.src", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-nova-api-0:2013.1.4-4.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-nova-api-0:2013.1.4-4.el6ost.noarch" }, "product_reference": "openstack-nova-api-0:2013.1.4-4.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-nova-cells-0:2013.1.4-4.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-nova-cells-0:2013.1.4-4.el6ost.noarch" }, "product_reference": "openstack-nova-cells-0:2013.1.4-4.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-nova-cert-0:2013.1.4-4.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-nova-cert-0:2013.1.4-4.el6ost.noarch" }, "product_reference": "openstack-nova-cert-0:2013.1.4-4.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-nova-common-0:2013.1.4-4.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-nova-common-0:2013.1.4-4.el6ost.noarch" }, "product_reference": "openstack-nova-common-0:2013.1.4-4.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-nova-compute-0:2013.1.4-4.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-nova-compute-0:2013.1.4-4.el6ost.noarch" }, "product_reference": "openstack-nova-compute-0:2013.1.4-4.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-nova-conductor-0:2013.1.4-4.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-nova-conductor-0:2013.1.4-4.el6ost.noarch" }, "product_reference": "openstack-nova-conductor-0:2013.1.4-4.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-nova-console-0:2013.1.4-4.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-nova-console-0:2013.1.4-4.el6ost.noarch" }, "product_reference": "openstack-nova-console-0:2013.1.4-4.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-nova-doc-0:2013.1.4-4.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-nova-doc-0:2013.1.4-4.el6ost.noarch" }, "product_reference": "openstack-nova-doc-0:2013.1.4-4.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-nova-network-0:2013.1.4-4.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-nova-network-0:2013.1.4-4.el6ost.noarch" }, "product_reference": "openstack-nova-network-0:2013.1.4-4.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-nova-objectstore-0:2013.1.4-4.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-nova-objectstore-0:2013.1.4-4.el6ost.noarch" }, "product_reference": "openstack-nova-objectstore-0:2013.1.4-4.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-nova-scheduler-0:2013.1.4-4.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:openstack-nova-scheduler-0:2013.1.4-4.el6ost.noarch" }, "product_reference": "openstack-nova-scheduler-0:2013.1.4-4.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" }, { "category": "default_component_of", "full_product_name": { "name": "python-nova-0:2013.1.4-4.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 3.0", "product_id": "6Server-Grizzly:python-nova-0:2013.1.4-4.el6ost.noarch" }, "product_reference": "python-nova-0:2013.1.4-4.el6ost.noarch", "relates_to_product_reference": "6Server-Grizzly" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Thierry Carrez" ], "organization": "OpenStack project" }, { "names": [ "Bernhard M. Wiedemann" ], "organization": "SuSE", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2013-4463", "discovery_date": "2013-10-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1023239" } ], "notes": [ { "category": "description", "text": "OpenStack Compute (Nova) Folsom, Grizzly, and Havana does not properly verify the virtual size of a QCOW2 image, which allows local users to cause a denial of service (host file system disk consumption) via a compressed QCOW2 image. NOTE: this issue is due to an incomplete fix for CVE-2013-2096.", "title": "Vulnerability description" }, { "category": "summary", "text": "Nova: Compressed disk image DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "The Red Hat Security Response Team has rated this issue as having moderate security impact. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-Grizzly:openstack-nova-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-0:2013.1.4-4.el6ost.src", "6Server-Grizzly:openstack-nova-api-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-cells-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-cert-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-common-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-compute-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-conductor-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-console-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-doc-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-network-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-objectstore-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-scheduler-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:python-nova-0:2013.1.4-4.el6ost.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-4463" }, { "category": "external", "summary": "RHBZ#1023239", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1023239" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-4463", "url": "https://www.cve.org/CVERecord?id=CVE-2013-4463" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4463", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4463" } ], "release_date": "2013-10-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-01-30T19:58:47+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "6Server-Grizzly:openstack-nova-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-0:2013.1.4-4.el6ost.src", "6Server-Grizzly:openstack-nova-api-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-cells-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-cert-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-common-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-compute-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-conductor-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-console-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-doc-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-network-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-objectstore-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-scheduler-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:python-nova-0:2013.1.4-4.el6ost.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0112" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Server-Grizzly:openstack-nova-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-0:2013.1.4-4.el6ost.src", "6Server-Grizzly:openstack-nova-api-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-cells-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-cert-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-common-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-compute-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-conductor-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-console-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-doc-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-network-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-objectstore-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-scheduler-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:python-nova-0:2013.1.4-4.el6ost.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Nova: Compressed disk image DoS" }, { "cve": "CVE-2013-6491", "discovery_date": "2014-01-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1059504" } ], "notes": [ { "category": "description", "text": "The python-qpid client (common/rpc/impl_qpid.py) in OpenStack Oslo before 2013.2 does not enforce SSL connections when qpid_protocol is set to ssl, which allows remote attackers to obtain sensitive information by sniffing the network.", "title": "Vulnerability description" }, { "category": "summary", "text": "nova: qpid SSL configuration", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-Grizzly:openstack-nova-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-0:2013.1.4-4.el6ost.src", "6Server-Grizzly:openstack-nova-api-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-cells-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-cert-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-common-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-compute-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-conductor-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-console-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-doc-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-network-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-objectstore-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-scheduler-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:python-nova-0:2013.1.4-4.el6ost.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-6491" }, { "category": "external", "summary": "RHBZ#1059504", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1059504" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-6491", "url": "https://www.cve.org/CVERecord?id=CVE-2013-6491" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-6491", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-6491" } ], "release_date": "2013-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-01-30T19:58:47+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "6Server-Grizzly:openstack-nova-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-0:2013.1.4-4.el6ost.src", "6Server-Grizzly:openstack-nova-api-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-cells-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-cert-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-common-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-compute-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-conductor-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-console-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-doc-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-network-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-objectstore-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-scheduler-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:python-nova-0:2013.1.4-4.el6ost.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0112" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Server-Grizzly:openstack-nova-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-0:2013.1.4-4.el6ost.src", "6Server-Grizzly:openstack-nova-api-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-cells-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-cert-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-common-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-compute-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-conductor-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-console-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-doc-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-network-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-objectstore-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:openstack-nova-scheduler-0:2013.1.4-4.el6ost.noarch", "6Server-Grizzly:python-nova-0:2013.1.4-4.el6ost.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nova: qpid SSL configuration" } ] }
ghsa-36gw-3xf6-9pvq
Vulnerability from github
Published
2022-05-17 04:41
Modified
2022-05-17 04:41
Details
The python-qpid client (common/rpc/impl_qpid.py) in OpenStack Oslo before 2013.2 does not enforce SSL connections when qpid_protocol is set to ssl, which allows remote attackers to obtain sensitive information by sniffing the network.
{ "affected": [], "aliases": [ "CVE-2013-6491" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2014-02-02T00:55:00Z", "severity": "MODERATE" }, "details": "The python-qpid client (common/rpc/impl_qpid.py) in OpenStack Oslo before 2013.2 does not enforce SSL connections when qpid_protocol is set to ssl, which allows remote attackers to obtain sensitive information by sniffing the network.", "id": "GHSA-36gw-3xf6-9pvq", "modified": "2022-05-17T04:41:34Z", "published": "2022-05-17T04:41:34Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-6491" }, { "type": "WEB", "url": "https://bugs.launchpad.net/oslo/+bug/1158807" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=996766" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2014-0112.html" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-2247-1" } ], "schema_version": "1.4.0", "severity": [] }
gsd-2013-6491
Vulnerability from gsd
Modified
2023-12-13 01:22
Details
The python-qpid client (common/rpc/impl_qpid.py) in OpenStack Oslo before 2013.2 does not enforce SSL connections when qpid_protocol is set to ssl, which allows remote attackers to obtain sensitive information by sniffing the network.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2013-6491", "description": "The python-qpid client (common/rpc/impl_qpid.py) in OpenStack Oslo before 2013.2 does not enforce SSL connections when qpid_protocol is set to ssl, which allows remote attackers to obtain sensitive information by sniffing the network.", "id": "GSD-2013-6491", "references": [ "https://www.suse.com/security/cve/CVE-2013-6491.html", "https://access.redhat.com/errata/RHBA-2014:0363", "https://access.redhat.com/errata/RHSA-2014:0112", "https://ubuntu.com/security/CVE-2013-6491" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2013-6491" ], "details": "The python-qpid client (common/rpc/impl_qpid.py) in OpenStack Oslo before 2013.2 does not enforce SSL connections when qpid_protocol is set to ssl, which allows remote attackers to obtain sensitive information by sniffing the network.", "id": "GSD-2013-6491", "modified": "2023-12-13T01:22:19.485969Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-6491", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_affected": "=", "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The python-qpid client (common/rpc/impl_qpid.py) in OpenStack Oslo before 2013.2 does not enforce SSL connections when qpid_protocol is set to ssl, which allows remote attackers to obtain sensitive information by sniffing the network." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://rhn.redhat.com/errata/RHSA-2014-0112.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2014-0112.html" }, { "name": "http://www.ubuntu.com/usn/USN-2247-1", "refsource": "MISC", "url": "http://www.ubuntu.com/usn/USN-2247-1" }, { "name": "https://bugs.launchpad.net/oslo/+bug/1158807", "refsource": "MISC", "url": "https://bugs.launchpad.net/oslo/+bug/1158807" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=996766", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=996766" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:redhat:openstack:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openstack:oslo:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2013", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-6491" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The python-qpid client (common/rpc/impl_qpid.py) in OpenStack Oslo before 2013.2 does not enforce SSL connections when qpid_protocol is set to ssl, which allows remote attackers to obtain sensitive information by sniffing the network." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-310" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=996766", "refsource": "CONFIRM", "tags": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=996766" }, { "name": "https://bugs.launchpad.net/oslo/+bug/1158807", "refsource": "CONFIRM", "tags": [], "url": "https://bugs.launchpad.net/oslo/+bug/1158807" }, { "name": "RHSA-2014:0112", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-0112.html" }, { "name": "USN-2247-1", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/USN-2247-1" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2014-06-21T04:36Z", "publishedDate": "2014-02-02T00:55Z" } } }
cve-2013-6491
Vulnerability from fkie_nvd
Published
2014-02-02 00:55
Modified
2024-11-21 01:59
Severity ?
Summary
The python-qpid client (common/rpc/impl_qpid.py) in OpenStack Oslo before 2013.2 does not enforce SSL connections when qpid_protocol is set to ssl, which allows remote attackers to obtain sensitive information by sniffing the network.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openstack:oslo:*:*:*:*:*:*:*:*", "matchCriteriaId": "0146D347-4531-44F8-91FD-C32CBEF9191A", "versionEndIncluding": "2013", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:openstack:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "6533B15B-F748-4A5D-AB86-31D38DFAE60F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The python-qpid client (common/rpc/impl_qpid.py) in OpenStack Oslo before 2013.2 does not enforce SSL connections when qpid_protocol is set to ssl, which allows remote attackers to obtain sensitive information by sniffing the network." }, { "lang": "es", "value": "El cliente python-qpid (common/rpc/impl_qpid.py) en OpenStack Oslo anterior a 2013.2 no fuerza conexiones SSL cuando qpid_protocol se establece a ssl, lo cual permite a atacantes remotos obtener informaci\u00f3n sensible escuchando la red." } ], "id": "CVE-2013-6491", "lastModified": "2024-11-21T01:59:19.913", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-02-02T00:55:04.647", "references": [ { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2014-0112.html" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/USN-2247-1" }, { "source": "secalert@redhat.com", "url": "https://bugs.launchpad.net/oslo/+bug/1158807" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=996766" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2014-0112.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-2247-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugs.launchpad.net/oslo/+bug/1158807" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=996766" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-310" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.