Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2015-0382 (GCVE-0-2015-0382)
Vulnerability from cvelistv5 – Published: 2015-01-21 18:00 – Updated: 2024-08-06 04:10- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T04:10:10.498Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "RHSA-2015:0118",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2015-0118.html"
},
{
"name": "DSA-3135",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2015/dsa-3135"
},
{
"name": "RHSA-2015:0116",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2015-0116.html"
},
{
"name": "USN-2480-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/USN-2480-1"
},
{
"name": "72200",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/72200"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
},
{
"name": "SUSE-SU-2015:0743",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html"
},
{
"name": "RHSA-2015:1628",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2015-1628.html"
},
{
"name": "62732",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62732"
},
{
"name": "RHSA-2015:0117",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2015-0117.html"
},
{
"name": "1031581",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1031581"
},
{
"name": "oracle-cpujan2015-cve20150382(100184)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100184"
},
{
"name": "GLSA-201504-05",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/201504-05"
},
{
"name": "62728",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62728"
},
{
"name": "FEDORA-2015-1162",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149929.html"
},
{
"name": "62730",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62730"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2015-01-17T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote attackers to affect availability via unknown vectors related to Server : Replication, a different vulnerability than CVE-2015-0381."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-07T15:57:01.000Z",
"orgId": "43595867-4340-4103-b7a2-9a5208d29a85",
"shortName": "oracle"
},
"references": [
{
"name": "RHSA-2015:0118",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2015-0118.html"
},
{
"name": "DSA-3135",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2015/dsa-3135"
},
{
"name": "RHSA-2015:0116",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2015-0116.html"
},
{
"name": "USN-2480-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/USN-2480-1"
},
{
"name": "72200",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/72200"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
},
{
"name": "SUSE-SU-2015:0743",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html"
},
{
"name": "RHSA-2015:1628",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2015-1628.html"
},
{
"name": "62732",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62732"
},
{
"name": "RHSA-2015:0117",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2015-0117.html"
},
{
"name": "1031581",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1031581"
},
{
"name": "oracle-cpujan2015-cve20150382(100184)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100184"
},
{
"name": "GLSA-201504-05",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "https://security.gentoo.org/glsa/201504-05"
},
{
"name": "62728",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62728"
},
{
"name": "FEDORA-2015-1162",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149929.html"
},
{
"name": "62730",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62730"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2015-0382",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote attackers to affect availability via unknown vectors related to Server : Replication, a different vulnerability than CVE-2015-0381."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "RHSA-2015:0118",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-0118.html"
},
{
"name": "DSA-3135",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3135"
},
{
"name": "RHSA-2015:0116",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-0116.html"
},
{
"name": "USN-2480-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2480-1"
},
{
"name": "72200",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/72200"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
},
{
"name": "SUSE-SU-2015:0743",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html"
},
{
"name": "RHSA-2015:1628",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1628.html"
},
{
"name": "62732",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62732"
},
{
"name": "RHSA-2015:0117",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-0117.html"
},
{
"name": "1031581",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1031581"
},
{
"name": "oracle-cpujan2015-cve20150382(100184)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100184"
},
{
"name": "GLSA-201504-05",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201504-05"
},
{
"name": "62728",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62728"
},
{
"name": "FEDORA-2015-1162",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149929.html"
},
{
"name": "62730",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62730"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "43595867-4340-4103-b7a2-9a5208d29a85",
"assignerShortName": "oracle",
"cveId": "CVE-2015-0382",
"datePublished": "2015-01-21T18:00:00.000Z",
"dateReserved": "2014-12-17T00:00:00.000Z",
"dateUpdated": "2024-08-06T04:10:10.498Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2015-0382",
"date": "2026-05-20",
"epss": "0.15179",
"percentile": "0.94687"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:communications_policy_management:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"9.7.3\", \"matchCriteriaId\": \"733AAB26-D6B3-4892-9531-2427551A7843\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:communications_policy_management:9.9.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1C1B1DA1-CB11-42D6-9F28-C1588A7A7D45\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:communications_policy_management:10.4.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F696923E-E5AB-4473-B404-A6CCB33B6DB8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:communications_policy_management:12.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AE69A446-E765-4141-83F6-B58EA7E3783A\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"79A602C5-61FE-47BA-9786-F045B6C6DBA8\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"5.5.0\", \"versionEndIncluding\": \"5.5.40\", \"matchCriteriaId\": \"390E3C4E-6B4D-4C58-8B4C-1D386EA405D9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"5.6.0\", \"versionEndIncluding\": \"5.6.21\", \"matchCriteriaId\": \"7CBD06C9-651C-41EB-A34A-9B369CFB23A0\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*\", \"matchCriteriaId\": \"CB66DB75-2B16-4EBF-9B93-CE49D8086E41\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*\", \"matchCriteriaId\": \"815D70A8-47D3-459C-A32C-9FEACA0659D1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"49A63F39-30BE-443F-AF10-6245587D3359\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"16F59A04-14CF-49E2-9973-645477EA09DA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FF47C9F0-D8DA-4B55-89EB-9B2C9383ADB9\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"5.5.0\", \"versionEndExcluding\": \"5.5.41\", \"matchCriteriaId\": \"2369490D-1828-42D9-98F9-7785717428D2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"10.0.0\", \"versionEndExcluding\": \"10.0.16\", \"matchCriteriaId\": \"FCD8904B-4692-403C-B0AA-C972D08C2FA8\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"133AAFA7-AF42-4D7B-8822-AA2E85611BF5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"33C068A4-3780-4EAB-A937-6082DF847564\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"807C024A-F8E8-4B48-A349-4C68CD252CA1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F96E3779-F56A-45FF-BB3D-4980527D721E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0CF73560-2F5B-4723-A8A1-9AADBB3ADA00\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5BF3C7A5-9117-42C7-BEA1-4AA378A582EF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"83737173-E12E-4641-BC49-0BD84A6B29D0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"54D669D4-6D7E-449D-80C1-28FA44F06FFE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"51EF4996-72F4-4FA4-814F-F5991E7A8318\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"98381E61-F082-4302-B51F-5648884F998B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D99A687E-EAE6-417E-A88E-D0082BC194CD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B353CE99-D57C-465B-AAB0-73EF581127D1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7431ABC1-9252-419E-8CC1-311B41360078\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"24C0F4E1-C52C-41E0-9F14-F83ADD5CC7ED\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B76AA310-FEC7-497F-AF04-C3EC1E76C4CC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D0AC5CD5-6E58-433C-9EB3-6DFE5656463E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"825ECE2D-E232-46E0-A047-074B34DB1E97\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"D2DF4815-B8CB-4AD3-B91D-2E09A8E318E9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"15FC9014-BD85-4382-9D04-C0703E901D7A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"1831D45A-EE6E-4220-8F8C-248B69520948\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"028ABA8F-4E7B-4CD0-B6FC-3A0941E254BA\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote attackers to affect availability via unknown vectors related to Server : Replication, a different vulnerability than CVE-2015-0381.\"}, {\"lang\": \"es\", \"value\": \"Vulnerabilidad no especificada en Oracle MySQL Server 5.5.40 y anteriores y 5.6.21 y anteriores permita a atacantes remotos afectar la disponibilidad a trav\\u00e9s de vectores desconocidos relacionados con Server : Replication, una vulnerabilidad diferente a CVE-2015-0381.\"}]",
"id": "CVE-2015-0382",
"lastModified": "2024-11-21T02:22:57.400",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:N/I:N/A:P\", \"baseScore\": 4.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2015-01-21T18:59:27.763",
"references": "[{\"url\": \"http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149929.html\", \"source\": \"secalert_us@oracle.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html\", \"source\": \"secalert_us@oracle.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2015-0116.html\", \"source\": \"secalert_us@oracle.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2015-0117.html\", \"source\": \"secalert_us@oracle.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2015-0118.html\", \"source\": \"secalert_us@oracle.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2015-1628.html\", \"source\": \"secalert_us@oracle.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/62728\", \"source\": \"secalert_us@oracle.com\", \"tags\": [\"Not Applicable\", \"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/62730\", \"source\": \"secalert_us@oracle.com\", \"tags\": [\"Not Applicable\", \"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/62732\", \"source\": \"secalert_us@oracle.com\", \"tags\": [\"Not Applicable\", \"Third Party Advisory\"]}, {\"url\": \"http://www.debian.org/security/2015/dsa-3135\", \"source\": \"secalert_us@oracle.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html\", \"source\": \"secalert_us@oracle.com\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html\", \"source\": \"secalert_us@oracle.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html\", \"source\": \"secalert_us@oracle.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html\", \"source\": \"secalert_us@oracle.com\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/72200\", \"source\": \"secalert_us@oracle.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id/1031581\", \"source\": \"secalert_us@oracle.com\", \"tags\": [\"Broken Link\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.ubuntu.com/usn/USN-2480-1\", \"source\": \"secalert_us@oracle.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/100184\", \"source\": \"secalert_us@oracle.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://security.gentoo.org/glsa/201504-05\", \"source\": \"secalert_us@oracle.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149929.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2015-0116.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2015-0117.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2015-0118.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2015-1628.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/62728\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Not Applicable\", \"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/62730\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Not Applicable\", \"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/62732\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Not Applicable\", \"Third Party Advisory\"]}, {\"url\": \"http://www.debian.org/security/2015/dsa-3135\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/72200\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id/1031581\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.ubuntu.com/usn/USN-2480-1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/100184\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://security.gentoo.org/glsa/201504-05\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]",
"sourceIdentifier": "secalert_us@oracle.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2015-0382\",\"sourceIdentifier\":\"secalert_us@oracle.com\",\"published\":\"2015-01-21T18:59:27.763\",\"lastModified\":\"2026-05-06T22:30:45.220\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote attackers to affect availability via unknown vectors related to Server : Replication, a different vulnerability than CVE-2015-0381.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad no especificada en Oracle MySQL Server 5.5.40 y anteriores y 5.6.21 y anteriores permita a atacantes remotos afectar la disponibilidad a trav\u00e9s de vectores desconocidos relacionados con Server : Replication, una vulnerabilidad diferente a CVE-2015-0381.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:N/A:P\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_policy_management:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"9.7.3\",\"matchCriteriaId\":\"733AAB26-D6B3-4892-9531-2427551A7843\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_policy_management:9.9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C1B1DA1-CB11-42D6-9F28-C1588A7A7D45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_policy_management:10.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F696923E-E5AB-4473-B404-A6CCB33B6DB8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_policy_management:12.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE69A446-E765-4141-83F6-B58EA7E3783A\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79A602C5-61FE-47BA-9786-F045B6C6DBA8\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.5.0\",\"versionEndIncluding\":\"5.5.40\",\"matchCriteriaId\":\"390E3C4E-6B4D-4C58-8B4C-1D386EA405D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.6.0\",\"versionEndIncluding\":\"5.6.21\",\"matchCriteriaId\":\"7CBD06C9-651C-41EB-A34A-9B369CFB23A0\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*\",\"matchCriteriaId\":\"CB66DB75-2B16-4EBF-9B93-CE49D8086E41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*\",\"matchCriteriaId\":\"815D70A8-47D3-459C-A32C-9FEACA0659D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49A63F39-30BE-443F-AF10-6245587D3359\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16F59A04-14CF-49E2-9973-645477EA09DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF47C9F0-D8DA-4B55-89EB-9B2C9383ADB9\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.5.0\",\"versionEndExcluding\":\"5.5.41\",\"matchCriteriaId\":\"2369490D-1828-42D9-98F9-7785717428D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.0.0\",\"versionEndExcluding\":\"10.0.16\",\"matchCriteriaId\":\"FCD8904B-4692-403C-B0AA-C972D08C2FA8\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"133AAFA7-AF42-4D7B-8822-AA2E85611BF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33C068A4-3780-4EAB-A937-6082DF847564\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"807C024A-F8E8-4B48-A349-4C68CD252CA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F96E3779-F56A-45FF-BB3D-4980527D721E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CF73560-2F5B-4723-A8A1-9AADBB3ADA00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BF3C7A5-9117-42C7-BEA1-4AA378A582EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83737173-E12E-4641-BC49-0BD84A6B29D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54D669D4-6D7E-449D-80C1-28FA44F06FFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51EF4996-72F4-4FA4-814F-F5991E7A8318\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98381E61-F082-4302-B51F-5648884F998B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D99A687E-EAE6-417E-A88E-D0082BC194CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B353CE99-D57C-465B-AAB0-73EF581127D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7431ABC1-9252-419E-8CC1-311B41360078\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24C0F4E1-C52C-41E0-9F14-F83ADD5CC7ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B76AA310-FEC7-497F-AF04-C3EC1E76C4CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0AC5CD5-6E58-433C-9EB3-6DFE5656463E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"825ECE2D-E232-46E0-A047-074B34DB1E97\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2DF4815-B8CB-4AD3-B91D-2E09A8E318E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"15FC9014-BD85-4382-9D04-C0703E901D7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"1831D45A-EE6E-4220-8F8C-248B69520948\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"028ABA8F-4E7B-4CD0-B6FC-3A0941E254BA\"}]}]}],\"references\":[{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149929.html\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-0116.html\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-0117.html\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-0118.html\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-1628.html\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/62728\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Not Applicable\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/62730\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Not Applicable\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/62732\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Not Applicable\",\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2015/dsa-3135\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/72200\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1031581\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-2480-1\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/100184\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://security.gentoo.org/glsa/201504-05\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149929.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-0116.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-0117.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-0118.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-1628.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/62728\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Not Applicable\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/62730\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Not Applicable\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/62732\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Not Applicable\",\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2015/dsa-3135\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/72200\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1031581\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-2480-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/100184\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://security.gentoo.org/glsa/201504-05\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}"
}
}
CERTFR-2015-AVI-032
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans Oracle MySQL. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à l'intégrité des données, et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "MySQL Server Version 5.5.40 et pr\u00e9c\u00e9dents",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server Version 5.6.21 et pr\u00e9c\u00e9dents",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server Version 5.5.38 et pr\u00e9c\u00e9dents",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server Version 5.6.19 et pr\u00e9c\u00e9dents",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2015-0391",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0391"
},
{
"name": "CVE-2015-0432",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0432"
},
{
"name": "CVE-2015-0381",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0381"
},
{
"name": "CVE-2015-0409",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0409"
},
{
"name": "CVE-2015-0411",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0411"
},
{
"name": "CVE-2015-0374",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0374"
},
{
"name": "CVE-2015-0382",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0382"
},
{
"name": "CVE-2015-0385",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0385"
},
{
"name": "CVE-2014-6568",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6568"
}
],
"links": [],
"reference": "CERTFR-2015-AVI-032",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2015-01-21T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eOracle MySQL\u003c/span\u003e. Certaines d\u0027entre elles permettent \u00e0\nun attaquant de provoquer un d\u00e9ni de service \u00e0 distance, une atteinte \u00e0\nl\u0027int\u00e9grit\u00e9 des donn\u00e9es, et une atteinte \u00e0 la confidentialit\u00e9 des\ndonn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle MySQL",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle CPUJan2015 du 20 janvier 2015",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html"
}
]
}
CERTFR-2015-AVI-032
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans Oracle MySQL. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à l'intégrité des données, et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "MySQL Server Version 5.5.40 et pr\u00e9c\u00e9dents",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server Version 5.6.21 et pr\u00e9c\u00e9dents",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server Version 5.5.38 et pr\u00e9c\u00e9dents",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server Version 5.6.19 et pr\u00e9c\u00e9dents",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2015-0391",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0391"
},
{
"name": "CVE-2015-0432",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0432"
},
{
"name": "CVE-2015-0381",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0381"
},
{
"name": "CVE-2015-0409",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0409"
},
{
"name": "CVE-2015-0411",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0411"
},
{
"name": "CVE-2015-0374",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0374"
},
{
"name": "CVE-2015-0382",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0382"
},
{
"name": "CVE-2015-0385",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0385"
},
{
"name": "CVE-2014-6568",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6568"
}
],
"links": [],
"reference": "CERTFR-2015-AVI-032",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2015-01-21T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eOracle MySQL\u003c/span\u003e. Certaines d\u0027entre elles permettent \u00e0\nun attaquant de provoquer un d\u00e9ni de service \u00e0 distance, une atteinte \u00e0\nl\u0027int\u00e9grit\u00e9 des donn\u00e9es, et une atteinte \u00e0 la confidentialit\u00e9 des\ndonn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle MySQL",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle CPUJan2015 du 20 janvier 2015",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html"
}
]
}
CNVD-2015-00627
Vulnerability from cnvd - Published: 2015-01-26用户可参考如下厂商提供的安全公告获取补丁以修复该漏洞: http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
| Name | ['Oracle MySQL Server <=5.5.40', 'Oracle MySQL Server <=5.6.21'] |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2015-0382"
}
},
"description": "MySQL\u662f\u4e00\u6b3e\u5f00\u6e90\u5173\u7cfb\u578b\u6570\u636e\u5e93\u7ba1\u7406\u7cfb\u7edf\u3002 \r\n\r\nOracle MySQL\u7684Server : Replication\u5b50\u4ef6\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u5141\u8bb8\u8fdc\u7a0b\u653b\u51fb\u8005\u5229\u7528\u6f0f\u6d1e\u5f71\u54cd\u7cfb\u7edf\u7684\u53ef\u7528\u6027\u3002",
"discovererName": "Oracle",
"formalWay": "\u7528\u6237\u53ef\u53c2\u8003\u5982\u4e0b\u5382\u5546\u63d0\u4f9b\u7684\u5b89\u5168\u516c\u544a\u83b7\u53d6\u8865\u4e01\u4ee5\u4fee\u590d\u8be5\u6f0f\u6d1e\uff1a\r\nhttp://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2015-00627",
"openTime": "2015-01-26",
"patchDescription": "MySQL\u662f\u4e00\u6b3e\u5f00\u6e90\u5173\u7cfb\u578b\u6570\u636e\u5e93\u7ba1\u7406\u7cfb\u7edf\u3002Oracle MySQL\u7684Server : Replication\u5b50\u4ef6\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u5141\u8bb8\u8fdc\u7a0b\u653b\u51fb\u8005\u5229\u7528\u6f0f\u6d1e\u5f71\u54cd\u7cfb\u7edf\u7684\u53ef\u7528\u6027\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Oracle MySQL Server\u5b58\u5728\u672a\u660e\u6f0f\u6d1e\uff08CNVD-2015-00627\uff09\u7684\u8865\u4e01",
"products": {
"product": [
"Oracle MySQL Server \u003c=5.5.40",
"Oracle MySQL Server \u003c=5.6.21"
]
},
"referenceLink": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
"serverity": "\u4e2d",
"submitTime": "2015-01-22",
"title": "Oracle MySQL Server\u5b58\u5728\u672a\u660e\u6f0f\u6d1e\uff08CNVD-2015-00627\uff09"
}
FKIE_CVE-2015-0382
Vulnerability from fkie_nvd - Published: 2015-01-21 18:59 - Updated: 2026-05-06 22:30{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:oracle:communications_policy_management:*:*:*:*:*:*:*:*",
"matchCriteriaId": "733AAB26-D6B3-4892-9531-2427551A7843",
"versionEndIncluding": "9.7.3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:communications_policy_management:9.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1C1B1DA1-CB11-42D6-9F28-C1588A7A7D45",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:communications_policy_management:10.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F696923E-E5AB-4473-B404-A6CCB33B6DB8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:communications_policy_management:12.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AE69A446-E765-4141-83F6-B58EA7E3783A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*",
"matchCriteriaId": "79A602C5-61FE-47BA-9786-F045B6C6DBA8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"matchCriteriaId": "390E3C4E-6B4D-4C58-8B4C-1D386EA405D9",
"versionEndIncluding": "5.5.40",
"versionStartIncluding": "5.5.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7CBD06C9-651C-41EB-A34A-9B369CFB23A0",
"versionEndIncluding": "5.6.21",
"versionStartIncluding": "5.6.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*",
"matchCriteriaId": "CB66DB75-2B16-4EBF-9B93-CE49D8086E41",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
"matchCriteriaId": "815D70A8-47D3-459C-A32C-9FEACA0659D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*",
"matchCriteriaId": "49A63F39-30BE-443F-AF10-6245587D3359",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*",
"matchCriteriaId": "FF47C9F0-D8DA-4B55-89EB-9B2C9383ADB9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2369490D-1828-42D9-98F9-7785717428D2",
"versionEndExcluding": "5.5.41",
"versionStartIncluding": "5.5.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FCD8904B-4692-403C-B0AA-C972D08C2FA8",
"versionEndExcluding": "10.0.16",
"versionStartIncluding": "10.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "133AAFA7-AF42-4D7B-8822-AA2E85611BF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "33C068A4-3780-4EAB-A937-6082DF847564",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "807C024A-F8E8-4B48-A349-4C68CD252CA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F96E3779-F56A-45FF-BB3D-4980527D721E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*",
"matchCriteriaId": "0CF73560-2F5B-4723-A8A1-9AADBB3ADA00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*",
"matchCriteriaId": "5BF3C7A5-9117-42C7-BEA1-4AA378A582EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*",
"matchCriteriaId": "83737173-E12E-4641-BC49-0BD84A6B29D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "54D669D4-6D7E-449D-80C1-28FA44F06FFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "98381E61-F082-4302-B51F-5648884F998B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "D99A687E-EAE6-417E-A88E-D0082BC194CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
"matchCriteriaId": "B353CE99-D57C-465B-AAB0-73EF581127D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
"matchCriteriaId": "7431ABC1-9252-419E-8CC1-311B41360078",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "24C0F4E1-C52C-41E0-9F14-F83ADD5CC7ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
"matchCriteriaId": "B76AA310-FEC7-497F-AF04-C3EC1E76C4CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D0AC5CD5-6E58-433C-9EB3-6DFE5656463E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*",
"matchCriteriaId": "D2DF4815-B8CB-4AD3-B91D-2E09A8E318E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*",
"matchCriteriaId": "15FC9014-BD85-4382-9D04-C0703E901D7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*",
"matchCriteriaId": "1831D45A-EE6E-4220-8F8C-248B69520948",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:-:*:*:*:*:*:*",
"matchCriteriaId": "028ABA8F-4E7B-4CD0-B6FC-3A0941E254BA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote attackers to affect availability via unknown vectors related to Server : Replication, a different vulnerability than CVE-2015-0381."
},
{
"lang": "es",
"value": "Vulnerabilidad no especificada en Oracle MySQL Server 5.5.40 y anteriores y 5.6.21 y anteriores permita a atacantes remotos afectar la disponibilidad a trav\u00e9s de vectores desconocidos relacionados con Server : Replication, una vulnerabilidad diferente a CVE-2015-0381."
}
],
"id": "CVE-2015-0382",
"lastModified": "2026-05-06T22:30:45.220",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2015-01-21T18:59:27.763",
"references": [
{
"source": "secalert_us@oracle.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149929.html"
},
{
"source": "secalert_us@oracle.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html"
},
{
"source": "secalert_us@oracle.com",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2015-0116.html"
},
{
"source": "secalert_us@oracle.com",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2015-0117.html"
},
{
"source": "secalert_us@oracle.com",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2015-0118.html"
},
{
"source": "secalert_us@oracle.com",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2015-1628.html"
},
{
"source": "secalert_us@oracle.com",
"tags": [
"Not Applicable",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/62728"
},
{
"source": "secalert_us@oracle.com",
"tags": [
"Not Applicable",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/62730"
},
{
"source": "secalert_us@oracle.com",
"tags": [
"Not Applicable",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/62732"
},
{
"source": "secalert_us@oracle.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2015/dsa-3135"
},
{
"source": "secalert_us@oracle.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"
},
{
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
},
{
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
},
{
"source": "secalert_us@oracle.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html"
},
{
"source": "secalert_us@oracle.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/72200"
},
{
"source": "secalert_us@oracle.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1031581"
},
{
"source": "secalert_us@oracle.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ubuntu.com/usn/USN-2480-1"
},
{
"source": "secalert_us@oracle.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100184"
},
{
"source": "secalert_us@oracle.com",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/201504-05"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149929.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2015-0116.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2015-0117.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2015-0118.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2015-1628.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Not Applicable",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/62728"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Not Applicable",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/62730"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Not Applicable",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/62732"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2015/dsa-3135"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/72200"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1031581"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ubuntu.com/usn/USN-2480-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100184"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/201504-05"
}
],
"sourceIdentifier": "secalert_us@oracle.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-G623-X8RQ-WRR5
Vulnerability from github – Published: 2022-05-14 01:37 – Updated: 2022-05-14 01:37Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote attackers to affect availability via unknown vectors related to Server : Replication, a different vulnerability than CVE-2015-0381.
{
"affected": [],
"aliases": [
"CVE-2015-0382"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2015-01-21T18:59:00Z",
"severity": "MODERATE"
},
"details": "Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote attackers to affect availability via unknown vectors related to Server : Replication, a different vulnerability than CVE-2015-0381.",
"id": "GHSA-g623-x8rq-wrr5",
"modified": "2022-05-14T01:37:25Z",
"published": "2022-05-14T01:37:25Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0382"
},
{
"type": "WEB",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100184"
},
{
"type": "WEB",
"url": "https://security.gentoo.org/glsa/201504-05"
},
{
"type": "WEB",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149929.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2015-0116.html"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2015-0117.html"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2015-0118.html"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1628.html"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/62728"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/62730"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/62732"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2015/dsa-3135"
},
{
"type": "WEB",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"
},
{
"type": "WEB",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
},
{
"type": "WEB",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
},
{
"type": "WEB",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/72200"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id/1031581"
},
{
"type": "WEB",
"url": "http://www.ubuntu.com/usn/USN-2480-1"
}
],
"schema_version": "1.4.0",
"severity": []
}
GSD-2015-0382
Vulnerability from gsd - Updated: 2023-12-13 01:19{
"GSD": {
"alias": "CVE-2015-0382",
"description": "Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote attackers to affect availability via unknown vectors related to Server : Replication, a different vulnerability than CVE-2015-0381.",
"id": "GSD-2015-0382",
"references": [
"https://www.suse.com/security/cve/CVE-2015-0382.html",
"https://www.debian.org/security/2015/dsa-3135",
"https://access.redhat.com/errata/RHSA-2015:1628",
"https://access.redhat.com/errata/RHBA-2015:0928",
"https://access.redhat.com/errata/RHBA-2015:0825",
"https://access.redhat.com/errata/RHBA-2015:0820",
"https://access.redhat.com/errata/RHSA-2015:0118",
"https://access.redhat.com/errata/RHSA-2015:0117",
"https://access.redhat.com/errata/RHSA-2015:0116",
"https://ubuntu.com/security/CVE-2015-0382",
"https://linux.oracle.com/cve/CVE-2015-0382.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2015-0382"
],
"details": "Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote attackers to affect availability via unknown vectors related to Server : Replication, a different vulnerability than CVE-2015-0381.",
"id": "GSD-2015-0382",
"modified": "2023-12-13T01:19:58.318619Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2015-0382",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote attackers to affect availability via unknown vectors related to Server : Replication, a different vulnerability than CVE-2015-0381."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "RHSA-2015:0118",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-0118.html"
},
{
"name": "DSA-3135",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2015/dsa-3135"
},
{
"name": "RHSA-2015:0116",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-0116.html"
},
{
"name": "USN-2480-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2480-1"
},
{
"name": "72200",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/72200"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
},
{
"name": "SUSE-SU-2015:0743",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html"
},
{
"name": "RHSA-2015:1628",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1628.html"
},
{
"name": "62732",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62732"
},
{
"name": "RHSA-2015:0117",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-0117.html"
},
{
"name": "1031581",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1031581"
},
{
"name": "oracle-cpujan2015-cve20150382(100184)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100184"
},
{
"name": "GLSA-201504-05",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201504-05"
},
{
"name": "62728",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62728"
},
{
"name": "FEDORA-2015-1162",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149929.html"
},
{
"name": "62730",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62730"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:oracle:communications_policy_management:12.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:communications_policy_management:9.9.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:communications_policy_management:10.4.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:communications_policy_management:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "9.7.3",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "5.5.40",
"versionStartIncluding": "5.5.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "5.6.21",
"versionStartIncluding": "5.6.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "10.0.16",
"versionStartIncluding": "10.0.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "5.5.41",
"versionStartIncluding": "5.5.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:-:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2015-0382"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote attackers to affect availability via unknown vectors related to Server : Replication, a different vulnerability than CVE-2015-0381."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
"refsource": "CONFIRM",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html"
},
{
"name": "72200",
"refsource": "BID",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/72200"
},
{
"name": "62732",
"refsource": "SECUNIA",
"tags": [
"Not Applicable",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/62732"
},
{
"name": "62730",
"refsource": "SECUNIA",
"tags": [
"Not Applicable",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/62730"
},
{
"name": "62728",
"refsource": "SECUNIA",
"tags": [
"Not Applicable",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/62728"
},
{
"name": "1031581",
"refsource": "SECTRACK",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1031581"
},
{
"name": "FEDORA-2015-1162",
"refsource": "FEDORA",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149929.html"
},
{
"name": "USN-2480-1",
"refsource": "UBUNTU",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ubuntu.com/usn/USN-2480-1"
},
{
"name": "DSA-3135",
"refsource": "DEBIAN",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2015/dsa-3135"
},
{
"name": "RHSA-2015:0116",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2015-0116.html"
},
{
"name": "RHSA-2015:0117",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2015-0117.html"
},
{
"name": "RHSA-2015:0118",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2015-0118.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"refsource": "CONFIRM",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"
},
{
"name": "GLSA-201504-05",
"refsource": "GENTOO",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/201504-05"
},
{
"name": "RHSA-2015:1628",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2015-1628.html"
},
{
"name": "SUSE-SU-2015:0743",
"refsource": "SUSE",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html"
},
{
"name": "oracle-cpujan2015-cve20150382(100184)",
"refsource": "XF",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100184"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2022-08-30T17:36Z",
"publishedDate": "2015-01-21T18:59Z"
}
}
}
RHBA-2015:0820
Vulnerability from csaf_redhat - Published: 2015-04-16 14:28 - Updated: 2026-01-13 21:13Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier, and 5.6.21 and earlier, allows remote authenticated users to affect availability via vectors related to Server : InnoDB : DML.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-RH6-RHOS-5.0:ceph-0:0.80.5-4.el6ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:ceph-common-0:0.80.5-4.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:ceph-debuginfo-0:0.80.5-4.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:librados2-0:0.80.5-4.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:librbd1-0:0.80.5-4.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:mariadb-galera-0:5.5.41-1.el6ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:mariadb-galera-common-0:5.5.41-1.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:mariadb-galera-debuginfo-0:5.5.41-1.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:mariadb-galera-server-0:5.5.41-1.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-ceph-0:0.80.5-4.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-novaclient-doc-1:2.17.0-4.el6ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-sqlalchemy-debuginfo-0:0.8.4-2.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.src | — |
Vendor Fix
fix
|
Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote authenticated users to affect confidentiality via unknown vectors related to Server : Security : Privileges : Foreign Key.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-RH6-RHOS-5.0:ceph-0:0.80.5-4.el6ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:ceph-common-0:0.80.5-4.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:ceph-debuginfo-0:0.80.5-4.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:librados2-0:0.80.5-4.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:librbd1-0:0.80.5-4.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:mariadb-galera-0:5.5.41-1.el6ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:mariadb-galera-common-0:5.5.41-1.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:mariadb-galera-debuginfo-0:5.5.41-1.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:mariadb-galera-server-0:5.5.41-1.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-ceph-0:0.80.5-4.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-novaclient-doc-1:2.17.0-4.el6ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-sqlalchemy-debuginfo-0:0.8.4-2.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.src | — |
Vendor Fix
fix
|
Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote attackers to affect availability via unknown vectors related to Server : Replication, a different vulnerability than CVE-2015-0382.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-RH6-RHOS-5.0:ceph-0:0.80.5-4.el6ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:ceph-common-0:0.80.5-4.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:ceph-debuginfo-0:0.80.5-4.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:librados2-0:0.80.5-4.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:librbd1-0:0.80.5-4.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:mariadb-galera-0:5.5.41-1.el6ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:mariadb-galera-common-0:5.5.41-1.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:mariadb-galera-debuginfo-0:5.5.41-1.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:mariadb-galera-server-0:5.5.41-1.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-ceph-0:0.80.5-4.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-novaclient-doc-1:2.17.0-4.el6ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-sqlalchemy-debuginfo-0:0.8.4-2.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.src | — |
Vendor Fix
fix
|
Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote attackers to affect availability via unknown vectors related to Server : Replication, a different vulnerability than CVE-2015-0381.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-RH6-RHOS-5.0:ceph-0:0.80.5-4.el6ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:ceph-common-0:0.80.5-4.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:ceph-debuginfo-0:0.80.5-4.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:librados2-0:0.80.5-4.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:librbd1-0:0.80.5-4.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:mariadb-galera-0:5.5.41-1.el6ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:mariadb-galera-common-0:5.5.41-1.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:mariadb-galera-debuginfo-0:5.5.41-1.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:mariadb-galera-server-0:5.5.41-1.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-ceph-0:0.80.5-4.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-novaclient-doc-1:2.17.0-4.el6ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-sqlalchemy-debuginfo-0:0.8.4-2.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.src | — |
Vendor Fix
fix
|
Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier, and 5.6.21 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Server : Security : Encryption.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-RH6-RHOS-5.0:ceph-0:0.80.5-4.el6ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:ceph-common-0:0.80.5-4.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:ceph-debuginfo-0:0.80.5-4.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:librados2-0:0.80.5-4.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:librbd1-0:0.80.5-4.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:mariadb-galera-0:5.5.41-1.el6ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:mariadb-galera-common-0:5.5.41-1.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:mariadb-galera-debuginfo-0:5.5.41-1.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:mariadb-galera-server-0:5.5.41-1.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-ceph-0:0.80.5-4.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-novaclient-doc-1:2.17.0-4.el6ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-sqlalchemy-debuginfo-0:0.8.4-2.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.src | — |
Vendor Fix
fix
|
Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier allows remote authenticated users to affect availability via vectors related to Server : InnoDB : DDL : Foreign Key.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-RH6-RHOS-5.0:ceph-0:0.80.5-4.el6ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:ceph-common-0:0.80.5-4.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:ceph-debuginfo-0:0.80.5-4.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:librados2-0:0.80.5-4.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:librbd1-0:0.80.5-4.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:mariadb-galera-0:5.5.41-1.el6ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:mariadb-galera-common-0:5.5.41-1.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:mariadb-galera-debuginfo-0:5.5.41-1.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:mariadb-galera-server-0:5.5.41-1.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-ceph-0:0.80.5-4.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-novaclient-doc-1:2.17.0-4.el6ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-sqlalchemy-debuginfo-0:0.8.4-2.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.src | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated packages that resolve various issues are now available for Red Hat\nEnterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Enterprise Linux OpenStack Platform provides the facilities for\nbuilding a private or public infrastructure-as-a-service (IaaS) cloud\nrunning on commonly available physical hardware.\n\nChanges to the ceph component:\n\n* In the previous version, launching of nova instances resulted in nova-compute to crash with a segmentation fault in certain cases when using Ceph RBD back end. This was due to the incorrect clean up in librbd1 packages. This has been fixed in this release, and nova-compute now operates correctly with Ceph RBD back end. (BZ#1182608)\n\nChanges to the python-novaclient component:\n\n* With this enhancement, a new command \u0027service-delete\u0027 has been added to the nova client to allow disabling services through the nova CLI as opposed to manually editing the nova-services table. (BZ#1206644)\n\nChanges to the python-requests component:\n\n* In the previous version, python-requests had issues including incorrect HTTP headers\u2019 generation, causing errors with python-swiftclient. This was due to python-requests having an incorrect implementation of a case insensitive mapping. With this release, case insensitive dictionary (CaseInsensitiveDict) has been updated which has fixed all issues with python-swiftclient. (BZ#1176181)\n\nChanges to the python-sqlalchemy component:\n\n* Previously, an improvement to the connection pool such that new connections could be made concurrently, made it so that the \u0027init on first connect\u0027 routine of a SQLAlchemy dialect would not have been completed if concurrent routines proceeded at the same time. As a result, when a SQLAlchemy engine was first used, operations which relied on the state acquired during initial startup could fail, as this information would not have been completed.\n\nTo resolve this issue, with this update, \u0027mutexing\u0027 was added to the event system which handles the initial dialect startup phase, so that connection attempts are again serialized, but only when the engine first starts up. (BZ#1198773)\n\n* Previously, the MySQL-Python DBAPI was observed under some circumstances using the ProgrammingError exception class to report on the \u0027command out of sync\u0027 errors, which is considered to be the case where a connection need to be thrown away; the SQLAlchemy dialect only expected this error to be emitted within the OperationalError class. As a result, in some cases a MySQL-Python connection that became corrupt would not signal to the SQLAlchemy engine that the pool of connections should be disposed, leading the engine not being able to proceed with new operations.\n\nWith this update, the error handling scheme of the MySQL-Python dialect is modified to expect either the OperationalError or ProgrammingError exception class when testing for this particular class of error. As a result, the SQLAlchemy engine/connection pool now correctly disposes off its connections when a MySQL-Python ProgrammingError delivers the \u0027command out of sync\u0027 error code. (BZ#1198774)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHBA-2015:0820",
"url": "https://access.redhat.com/errata/RHBA-2015:0820"
},
{
"category": "external",
"summary": "https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux_OpenStack_Platform/5/html/Release_Notes/index.html",
"url": "https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux_OpenStack_Platform/5/html/Release_Notes/index.html"
},
{
"category": "external",
"summary": "1168323",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1168323"
},
{
"category": "external",
"summary": "1176181",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1176181"
},
{
"category": "external",
"summary": "1183150",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183150"
},
{
"category": "external",
"summary": "1198773",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1198773"
},
{
"category": "external",
"summary": "1198774",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1198774"
},
{
"category": "external",
"summary": "1206644",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206644"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhba-2015_0820.json"
}
],
"title": "Red Hat Bug Fix Advisory: Red Hat Enterprise Linux OpenStack Platform Bug Fix and Enhancement Advisory",
"tracking": {
"current_release_date": "2026-01-13T21:13:49+00:00",
"generator": {
"date": "2026-01-13T21:13:49+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.15"
}
},
"id": "RHBA-2015:0820",
"initial_release_date": "2015-04-16T14:28:41+00:00",
"revision_history": [
{
"date": "2015-04-16T14:28:41+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2015-04-16T14:28:41+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-13T21:13:49+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6",
"product": {
"name": "Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6",
"product_id": "6Server-RH6-RHOS-5.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openstack:5::el6"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenStack Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "python-requests-0:2.3.0-1.el6.src",
"product": {
"name": "python-requests-0:2.3.0-1.el6.src",
"product_id": "python-requests-0:2.3.0-1.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-requests@2.3.0-1.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-novaclient-1:2.17.0-4.el6ost.src",
"product": {
"name": "python-novaclient-1:2.17.0-4.el6ost.src",
"product_id": "python-novaclient-1:2.17.0-4.el6ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-novaclient@2.17.0-4.el6ost?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "python-sqlalchemy-0:0.8.4-2.el6ost.src",
"product": {
"name": "python-sqlalchemy-0:0.8.4-2.el6ost.src",
"product_id": "python-sqlalchemy-0:0.8.4-2.el6ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-sqlalchemy@0.8.4-2.el6ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "openstack-utils-0:2014.2-1.el6ost.src",
"product": {
"name": "openstack-utils-0:2014.2-1.el6ost.src",
"product_id": "openstack-utils-0:2014.2-1.el6ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-utils@2014.2-1.el6ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "ceph-0:0.80.5-4.el6ost.src",
"product": {
"name": "ceph-0:0.80.5-4.el6ost.src",
"product_id": "ceph-0:0.80.5-4.el6ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ceph@0.80.5-4.el6ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-urllib3-0:1.8.2-4.1.el6.src",
"product": {
"name": "python-urllib3-0:1.8.2-4.1.el6.src",
"product_id": "python-urllib3-0:1.8.2-4.1.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-urllib3@1.8.2-4.1.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "mariadb-galera-0:5.5.41-1.el6ost.src",
"product": {
"name": "mariadb-galera-0:5.5.41-1.el6ost.src",
"product_id": "mariadb-galera-0:5.5.41-1.el6ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mariadb-galera@5.5.41-1.el6ost?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python-requests-0:2.3.0-1.el6.noarch",
"product": {
"name": "python-requests-0:2.3.0-1.el6.noarch",
"product_id": "python-requests-0:2.3.0-1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-requests@2.3.0-1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python-novaclient-1:2.17.0-4.el6ost.noarch",
"product": {
"name": "python-novaclient-1:2.17.0-4.el6ost.noarch",
"product_id": "python-novaclient-1:2.17.0-4.el6ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-novaclient@2.17.0-4.el6ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "python-novaclient-doc-1:2.17.0-4.el6ost.noarch",
"product": {
"name": "python-novaclient-doc-1:2.17.0-4.el6ost.noarch",
"product_id": "python-novaclient-doc-1:2.17.0-4.el6ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-novaclient-doc@2.17.0-4.el6ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openstack-utils-0:2014.2-1.el6ost.noarch",
"product": {
"name": "openstack-utils-0:2014.2-1.el6ost.noarch",
"product_id": "openstack-utils-0:2014.2-1.el6ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-utils@2014.2-1.el6ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python-urllib3-0:1.8.2-4.1.el6.noarch",
"product": {
"name": "python-urllib3-0:1.8.2-4.1.el6.noarch",
"product_id": "python-urllib3-0:1.8.2-4.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-urllib3@1.8.2-4.1.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "python-sqlalchemy-0:0.8.4-2.el6ost.x86_64",
"product": {
"name": "python-sqlalchemy-0:0.8.4-2.el6ost.x86_64",
"product_id": "python-sqlalchemy-0:0.8.4-2.el6ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-sqlalchemy@0.8.4-2.el6ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-sqlalchemy-debuginfo-0:0.8.4-2.el6ost.x86_64",
"product": {
"name": "python-sqlalchemy-debuginfo-0:0.8.4-2.el6ost.x86_64",
"product_id": "python-sqlalchemy-debuginfo-0:0.8.4-2.el6ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-sqlalchemy-debuginfo@0.8.4-2.el6ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ceph-common-0:0.80.5-4.el6ost.x86_64",
"product": {
"name": "ceph-common-0:0.80.5-4.el6ost.x86_64",
"product_id": "ceph-common-0:0.80.5-4.el6ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ceph-common@0.80.5-4.el6ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "librbd1-0:0.80.5-4.el6ost.x86_64",
"product": {
"name": "librbd1-0:0.80.5-4.el6ost.x86_64",
"product_id": "librbd1-0:0.80.5-4.el6ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/librbd1@0.80.5-4.el6ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-ceph-0:0.80.5-4.el6ost.x86_64",
"product": {
"name": "python-ceph-0:0.80.5-4.el6ost.x86_64",
"product_id": "python-ceph-0:0.80.5-4.el6ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-ceph@0.80.5-4.el6ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ceph-debuginfo-0:0.80.5-4.el6ost.x86_64",
"product": {
"name": "ceph-debuginfo-0:0.80.5-4.el6ost.x86_64",
"product_id": "ceph-debuginfo-0:0.80.5-4.el6ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ceph-debuginfo@0.80.5-4.el6ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "librados2-0:0.80.5-4.el6ost.x86_64",
"product": {
"name": "librados2-0:0.80.5-4.el6ost.x86_64",
"product_id": "librados2-0:0.80.5-4.el6ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/librados2@0.80.5-4.el6ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mariadb-galera-debuginfo-0:5.5.41-1.el6ost.x86_64",
"product": {
"name": "mariadb-galera-debuginfo-0:5.5.41-1.el6ost.x86_64",
"product_id": "mariadb-galera-debuginfo-0:5.5.41-1.el6ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mariadb-galera-debuginfo@5.5.41-1.el6ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mariadb-galera-common-0:5.5.41-1.el6ost.x86_64",
"product": {
"name": "mariadb-galera-common-0:5.5.41-1.el6ost.x86_64",
"product_id": "mariadb-galera-common-0:5.5.41-1.el6ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mariadb-galera-common@5.5.41-1.el6ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mariadb-galera-server-0:5.5.41-1.el6ost.x86_64",
"product": {
"name": "mariadb-galera-server-0:5.5.41-1.el6ost.x86_64",
"product_id": "mariadb-galera-server-0:5.5.41-1.el6ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mariadb-galera-server@5.5.41-1.el6ost?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ceph-0:0.80.5-4.el6ost.src as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6",
"product_id": "6Server-RH6-RHOS-5.0:ceph-0:0.80.5-4.el6ost.src"
},
"product_reference": "ceph-0:0.80.5-4.el6ost.src",
"relates_to_product_reference": "6Server-RH6-RHOS-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ceph-common-0:0.80.5-4.el6ost.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6",
"product_id": "6Server-RH6-RHOS-5.0:ceph-common-0:0.80.5-4.el6ost.x86_64"
},
"product_reference": "ceph-common-0:0.80.5-4.el6ost.x86_64",
"relates_to_product_reference": "6Server-RH6-RHOS-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ceph-debuginfo-0:0.80.5-4.el6ost.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6",
"product_id": "6Server-RH6-RHOS-5.0:ceph-debuginfo-0:0.80.5-4.el6ost.x86_64"
},
"product_reference": "ceph-debuginfo-0:0.80.5-4.el6ost.x86_64",
"relates_to_product_reference": "6Server-RH6-RHOS-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "librados2-0:0.80.5-4.el6ost.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6",
"product_id": "6Server-RH6-RHOS-5.0:librados2-0:0.80.5-4.el6ost.x86_64"
},
"product_reference": "librados2-0:0.80.5-4.el6ost.x86_64",
"relates_to_product_reference": "6Server-RH6-RHOS-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "librbd1-0:0.80.5-4.el6ost.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6",
"product_id": "6Server-RH6-RHOS-5.0:librbd1-0:0.80.5-4.el6ost.x86_64"
},
"product_reference": "librbd1-0:0.80.5-4.el6ost.x86_64",
"relates_to_product_reference": "6Server-RH6-RHOS-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mariadb-galera-0:5.5.41-1.el6ost.src as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6",
"product_id": "6Server-RH6-RHOS-5.0:mariadb-galera-0:5.5.41-1.el6ost.src"
},
"product_reference": "mariadb-galera-0:5.5.41-1.el6ost.src",
"relates_to_product_reference": "6Server-RH6-RHOS-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mariadb-galera-common-0:5.5.41-1.el6ost.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6",
"product_id": "6Server-RH6-RHOS-5.0:mariadb-galera-common-0:5.5.41-1.el6ost.x86_64"
},
"product_reference": "mariadb-galera-common-0:5.5.41-1.el6ost.x86_64",
"relates_to_product_reference": "6Server-RH6-RHOS-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mariadb-galera-debuginfo-0:5.5.41-1.el6ost.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6",
"product_id": "6Server-RH6-RHOS-5.0:mariadb-galera-debuginfo-0:5.5.41-1.el6ost.x86_64"
},
"product_reference": "mariadb-galera-debuginfo-0:5.5.41-1.el6ost.x86_64",
"relates_to_product_reference": "6Server-RH6-RHOS-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mariadb-galera-server-0:5.5.41-1.el6ost.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6",
"product_id": "6Server-RH6-RHOS-5.0:mariadb-galera-server-0:5.5.41-1.el6ost.x86_64"
},
"product_reference": "mariadb-galera-server-0:5.5.41-1.el6ost.x86_64",
"relates_to_product_reference": "6Server-RH6-RHOS-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-utils-0:2014.2-1.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6",
"product_id": "6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.noarch"
},
"product_reference": "openstack-utils-0:2014.2-1.el6ost.noarch",
"relates_to_product_reference": "6Server-RH6-RHOS-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-utils-0:2014.2-1.el6ost.src as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6",
"product_id": "6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.src"
},
"product_reference": "openstack-utils-0:2014.2-1.el6ost.src",
"relates_to_product_reference": "6Server-RH6-RHOS-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-ceph-0:0.80.5-4.el6ost.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6",
"product_id": "6Server-RH6-RHOS-5.0:python-ceph-0:0.80.5-4.el6ost.x86_64"
},
"product_reference": "python-ceph-0:0.80.5-4.el6ost.x86_64",
"relates_to_product_reference": "6Server-RH6-RHOS-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-novaclient-1:2.17.0-4.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6",
"product_id": "6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.noarch"
},
"product_reference": "python-novaclient-1:2.17.0-4.el6ost.noarch",
"relates_to_product_reference": "6Server-RH6-RHOS-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-novaclient-1:2.17.0-4.el6ost.src as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6",
"product_id": "6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.src"
},
"product_reference": "python-novaclient-1:2.17.0-4.el6ost.src",
"relates_to_product_reference": "6Server-RH6-RHOS-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-novaclient-doc-1:2.17.0-4.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6",
"product_id": "6Server-RH6-RHOS-5.0:python-novaclient-doc-1:2.17.0-4.el6ost.noarch"
},
"product_reference": "python-novaclient-doc-1:2.17.0-4.el6ost.noarch",
"relates_to_product_reference": "6Server-RH6-RHOS-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-requests-0:2.3.0-1.el6.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6",
"product_id": "6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.noarch"
},
"product_reference": "python-requests-0:2.3.0-1.el6.noarch",
"relates_to_product_reference": "6Server-RH6-RHOS-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-requests-0:2.3.0-1.el6.src as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6",
"product_id": "6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.src"
},
"product_reference": "python-requests-0:2.3.0-1.el6.src",
"relates_to_product_reference": "6Server-RH6-RHOS-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-sqlalchemy-0:0.8.4-2.el6ost.src as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6",
"product_id": "6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.src"
},
"product_reference": "python-sqlalchemy-0:0.8.4-2.el6ost.src",
"relates_to_product_reference": "6Server-RH6-RHOS-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-sqlalchemy-0:0.8.4-2.el6ost.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6",
"product_id": "6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.x86_64"
},
"product_reference": "python-sqlalchemy-0:0.8.4-2.el6ost.x86_64",
"relates_to_product_reference": "6Server-RH6-RHOS-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-sqlalchemy-debuginfo-0:0.8.4-2.el6ost.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6",
"product_id": "6Server-RH6-RHOS-5.0:python-sqlalchemy-debuginfo-0:0.8.4-2.el6ost.x86_64"
},
"product_reference": "python-sqlalchemy-debuginfo-0:0.8.4-2.el6ost.x86_64",
"relates_to_product_reference": "6Server-RH6-RHOS-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-urllib3-0:1.8.2-4.1.el6.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6",
"product_id": "6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.noarch"
},
"product_reference": "python-urllib3-0:1.8.2-4.1.el6.noarch",
"relates_to_product_reference": "6Server-RH6-RHOS-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-urllib3-0:1.8.2-4.1.el6.src as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6",
"product_id": "6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.src"
},
"product_reference": "python-urllib3-0:1.8.2-4.1.el6.src",
"relates_to_product_reference": "6Server-RH6-RHOS-5.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2014-6568",
"discovery_date": "2015-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1184552"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier, and 5.6.21 and earlier, allows remote authenticated users to affect availability via vectors related to Server : InnoDB : DML.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: unspecified vulnerability related to Server:InnoDB:DML (CPU Jan 2015)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-RH6-RHOS-5.0:ceph-0:0.80.5-4.el6ost.src",
"6Server-RH6-RHOS-5.0:ceph-common-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:ceph-debuginfo-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:librados2-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:librbd1-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-0:5.5.41-1.el6ost.src",
"6Server-RH6-RHOS-5.0:mariadb-galera-common-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-debuginfo-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-server-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.noarch",
"6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.src",
"6Server-RH6-RHOS-5.0:python-ceph-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.noarch",
"6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.src",
"6Server-RH6-RHOS-5.0:python-novaclient-doc-1:2.17.0-4.el6ost.noarch",
"6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.noarch",
"6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.src",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.src",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-debuginfo-0:0.8.4-2.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.noarch",
"6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-6568"
},
{
"category": "external",
"summary": "RHBZ#1184552",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184552"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-6568",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6568"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-6568",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6568"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html#AppendixMSQL",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html#AppendixMSQL"
}
],
"release_date": "2015-01-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2015-04-16T14:28:41+00:00",
"details": "Before applying this update, ensure all previously released errata relevant to your system have been applied.\n\nRed Hat Enterprise Linux OpenStack Platform 5 runs on Red Hat Enterprise Linux 6.6.\n\nThe Red Hat Enterprise Linux OpenStack Platform 5 Release Notes (see References section) contain the following:\n* An explanation of the way in which the provided components interact to form a working cloud computing environment.\n* Technology Previews, Recommended Practices, and Known Issues.\n* The channels required for Red Hat Enterprise Linux OpenStack Platform 5, including which channels need to be enabled and disabled.\n\nThis update is available through the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258",
"product_ids": [
"6Server-RH6-RHOS-5.0:ceph-0:0.80.5-4.el6ost.src",
"6Server-RH6-RHOS-5.0:ceph-common-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:ceph-debuginfo-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:librados2-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:librbd1-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-0:5.5.41-1.el6ost.src",
"6Server-RH6-RHOS-5.0:mariadb-galera-common-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-debuginfo-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-server-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.noarch",
"6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.src",
"6Server-RH6-RHOS-5.0:python-ceph-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.noarch",
"6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.src",
"6Server-RH6-RHOS-5.0:python-novaclient-doc-1:2.17.0-4.el6ost.noarch",
"6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.noarch",
"6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.src",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.src",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-debuginfo-0:0.8.4-2.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.noarch",
"6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2015:0820"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"6Server-RH6-RHOS-5.0:ceph-0:0.80.5-4.el6ost.src",
"6Server-RH6-RHOS-5.0:ceph-common-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:ceph-debuginfo-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:librados2-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:librbd1-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-0:5.5.41-1.el6ost.src",
"6Server-RH6-RHOS-5.0:mariadb-galera-common-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-debuginfo-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-server-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.noarch",
"6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.src",
"6Server-RH6-RHOS-5.0:python-ceph-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.noarch",
"6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.src",
"6Server-RH6-RHOS-5.0:python-novaclient-doc-1:2.17.0-4.el6ost.noarch",
"6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.noarch",
"6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.src",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.src",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-debuginfo-0:0.8.4-2.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.noarch",
"6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "mysql: unspecified vulnerability related to Server:InnoDB:DML (CPU Jan 2015)"
},
{
"cve": "CVE-2015-0374",
"discovery_date": "2015-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1184553"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote authenticated users to affect confidentiality via unknown vectors related to Server : Security : Privileges : Foreign Key.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: unspecified vulnerability related to Server:Security:Privileges:Foreign Key (CPU Jan 2015)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-RH6-RHOS-5.0:ceph-0:0.80.5-4.el6ost.src",
"6Server-RH6-RHOS-5.0:ceph-common-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:ceph-debuginfo-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:librados2-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:librbd1-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-0:5.5.41-1.el6ost.src",
"6Server-RH6-RHOS-5.0:mariadb-galera-common-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-debuginfo-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-server-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.noarch",
"6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.src",
"6Server-RH6-RHOS-5.0:python-ceph-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.noarch",
"6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.src",
"6Server-RH6-RHOS-5.0:python-novaclient-doc-1:2.17.0-4.el6ost.noarch",
"6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.noarch",
"6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.src",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.src",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-debuginfo-0:0.8.4-2.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.noarch",
"6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2015-0374"
},
{
"category": "external",
"summary": "RHBZ#1184553",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184553"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2015-0374",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0374"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-0374",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0374"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html#AppendixMSQL",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html#AppendixMSQL"
}
],
"release_date": "2015-01-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2015-04-16T14:28:41+00:00",
"details": "Before applying this update, ensure all previously released errata relevant to your system have been applied.\n\nRed Hat Enterprise Linux OpenStack Platform 5 runs on Red Hat Enterprise Linux 6.6.\n\nThe Red Hat Enterprise Linux OpenStack Platform 5 Release Notes (see References section) contain the following:\n* An explanation of the way in which the provided components interact to form a working cloud computing environment.\n* Technology Previews, Recommended Practices, and Known Issues.\n* The channels required for Red Hat Enterprise Linux OpenStack Platform 5, including which channels need to be enabled and disabled.\n\nThis update is available through the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258",
"product_ids": [
"6Server-RH6-RHOS-5.0:ceph-0:0.80.5-4.el6ost.src",
"6Server-RH6-RHOS-5.0:ceph-common-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:ceph-debuginfo-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:librados2-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:librbd1-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-0:5.5.41-1.el6ost.src",
"6Server-RH6-RHOS-5.0:mariadb-galera-common-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-debuginfo-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-server-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.noarch",
"6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.src",
"6Server-RH6-RHOS-5.0:python-ceph-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.noarch",
"6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.src",
"6Server-RH6-RHOS-5.0:python-novaclient-doc-1:2.17.0-4.el6ost.noarch",
"6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.noarch",
"6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.src",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.src",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-debuginfo-0:0.8.4-2.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.noarch",
"6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2015:0820"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"6Server-RH6-RHOS-5.0:ceph-0:0.80.5-4.el6ost.src",
"6Server-RH6-RHOS-5.0:ceph-common-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:ceph-debuginfo-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:librados2-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:librbd1-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-0:5.5.41-1.el6ost.src",
"6Server-RH6-RHOS-5.0:mariadb-galera-common-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-debuginfo-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-server-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.noarch",
"6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.src",
"6Server-RH6-RHOS-5.0:python-ceph-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.noarch",
"6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.src",
"6Server-RH6-RHOS-5.0:python-novaclient-doc-1:2.17.0-4.el6ost.noarch",
"6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.noarch",
"6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.src",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.src",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-debuginfo-0:0.8.4-2.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.noarch",
"6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "mysql: unspecified vulnerability related to Server:Security:Privileges:Foreign Key (CPU Jan 2015)"
},
{
"cve": "CVE-2015-0381",
"discovery_date": "2015-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1184554"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote attackers to affect availability via unknown vectors related to Server : Replication, a different vulnerability than CVE-2015-0382.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: unspecified vulnerability related to Server:Replication (CPU Jan 2015)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-RH6-RHOS-5.0:ceph-0:0.80.5-4.el6ost.src",
"6Server-RH6-RHOS-5.0:ceph-common-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:ceph-debuginfo-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:librados2-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:librbd1-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-0:5.5.41-1.el6ost.src",
"6Server-RH6-RHOS-5.0:mariadb-galera-common-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-debuginfo-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-server-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.noarch",
"6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.src",
"6Server-RH6-RHOS-5.0:python-ceph-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.noarch",
"6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.src",
"6Server-RH6-RHOS-5.0:python-novaclient-doc-1:2.17.0-4.el6ost.noarch",
"6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.noarch",
"6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.src",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.src",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-debuginfo-0:0.8.4-2.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.noarch",
"6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2015-0381"
},
{
"category": "external",
"summary": "RHBZ#1184554",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184554"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2015-0381",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0381"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-0381",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0381"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html#AppendixMSQL",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html#AppendixMSQL"
}
],
"release_date": "2015-01-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2015-04-16T14:28:41+00:00",
"details": "Before applying this update, ensure all previously released errata relevant to your system have been applied.\n\nRed Hat Enterprise Linux OpenStack Platform 5 runs on Red Hat Enterprise Linux 6.6.\n\nThe Red Hat Enterprise Linux OpenStack Platform 5 Release Notes (see References section) contain the following:\n* An explanation of the way in which the provided components interact to form a working cloud computing environment.\n* Technology Previews, Recommended Practices, and Known Issues.\n* The channels required for Red Hat Enterprise Linux OpenStack Platform 5, including which channels need to be enabled and disabled.\n\nThis update is available through the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258",
"product_ids": [
"6Server-RH6-RHOS-5.0:ceph-0:0.80.5-4.el6ost.src",
"6Server-RH6-RHOS-5.0:ceph-common-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:ceph-debuginfo-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:librados2-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:librbd1-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-0:5.5.41-1.el6ost.src",
"6Server-RH6-RHOS-5.0:mariadb-galera-common-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-debuginfo-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-server-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.noarch",
"6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.src",
"6Server-RH6-RHOS-5.0:python-ceph-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.noarch",
"6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.src",
"6Server-RH6-RHOS-5.0:python-novaclient-doc-1:2.17.0-4.el6ost.noarch",
"6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.noarch",
"6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.src",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.src",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-debuginfo-0:0.8.4-2.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.noarch",
"6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2015:0820"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"6Server-RH6-RHOS-5.0:ceph-0:0.80.5-4.el6ost.src",
"6Server-RH6-RHOS-5.0:ceph-common-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:ceph-debuginfo-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:librados2-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:librbd1-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-0:5.5.41-1.el6ost.src",
"6Server-RH6-RHOS-5.0:mariadb-galera-common-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-debuginfo-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-server-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.noarch",
"6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.src",
"6Server-RH6-RHOS-5.0:python-ceph-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.noarch",
"6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.src",
"6Server-RH6-RHOS-5.0:python-novaclient-doc-1:2.17.0-4.el6ost.noarch",
"6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.noarch",
"6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.src",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.src",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-debuginfo-0:0.8.4-2.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.noarch",
"6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: unspecified vulnerability related to Server:Replication (CPU Jan 2015)"
},
{
"cve": "CVE-2015-0382",
"discovery_date": "2015-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1184555"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote attackers to affect availability via unknown vectors related to Server : Replication, a different vulnerability than CVE-2015-0381.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: unspecified vulnerability related to Server:Replication (CPU Jan 2015)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-RH6-RHOS-5.0:ceph-0:0.80.5-4.el6ost.src",
"6Server-RH6-RHOS-5.0:ceph-common-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:ceph-debuginfo-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:librados2-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:librbd1-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-0:5.5.41-1.el6ost.src",
"6Server-RH6-RHOS-5.0:mariadb-galera-common-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-debuginfo-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-server-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.noarch",
"6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.src",
"6Server-RH6-RHOS-5.0:python-ceph-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.noarch",
"6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.src",
"6Server-RH6-RHOS-5.0:python-novaclient-doc-1:2.17.0-4.el6ost.noarch",
"6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.noarch",
"6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.src",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.src",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-debuginfo-0:0.8.4-2.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.noarch",
"6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2015-0382"
},
{
"category": "external",
"summary": "RHBZ#1184555",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184555"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2015-0382",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0382"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-0382",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0382"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html#AppendixMSQL",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html#AppendixMSQL"
}
],
"release_date": "2015-01-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2015-04-16T14:28:41+00:00",
"details": "Before applying this update, ensure all previously released errata relevant to your system have been applied.\n\nRed Hat Enterprise Linux OpenStack Platform 5 runs on Red Hat Enterprise Linux 6.6.\n\nThe Red Hat Enterprise Linux OpenStack Platform 5 Release Notes (see References section) contain the following:\n* An explanation of the way in which the provided components interact to form a working cloud computing environment.\n* Technology Previews, Recommended Practices, and Known Issues.\n* The channels required for Red Hat Enterprise Linux OpenStack Platform 5, including which channels need to be enabled and disabled.\n\nThis update is available through the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258",
"product_ids": [
"6Server-RH6-RHOS-5.0:ceph-0:0.80.5-4.el6ost.src",
"6Server-RH6-RHOS-5.0:ceph-common-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:ceph-debuginfo-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:librados2-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:librbd1-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-0:5.5.41-1.el6ost.src",
"6Server-RH6-RHOS-5.0:mariadb-galera-common-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-debuginfo-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-server-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.noarch",
"6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.src",
"6Server-RH6-RHOS-5.0:python-ceph-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.noarch",
"6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.src",
"6Server-RH6-RHOS-5.0:python-novaclient-doc-1:2.17.0-4.el6ost.noarch",
"6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.noarch",
"6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.src",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.src",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-debuginfo-0:0.8.4-2.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.noarch",
"6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2015:0820"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"6Server-RH6-RHOS-5.0:ceph-0:0.80.5-4.el6ost.src",
"6Server-RH6-RHOS-5.0:ceph-common-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:ceph-debuginfo-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:librados2-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:librbd1-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-0:5.5.41-1.el6ost.src",
"6Server-RH6-RHOS-5.0:mariadb-galera-common-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-debuginfo-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-server-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.noarch",
"6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.src",
"6Server-RH6-RHOS-5.0:python-ceph-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.noarch",
"6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.src",
"6Server-RH6-RHOS-5.0:python-novaclient-doc-1:2.17.0-4.el6ost.noarch",
"6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.noarch",
"6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.src",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.src",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-debuginfo-0:0.8.4-2.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.noarch",
"6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: unspecified vulnerability related to Server:Replication (CPU Jan 2015)"
},
{
"cve": "CVE-2015-0411",
"discovery_date": "2015-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1184560"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier, and 5.6.21 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Server : Security : Encryption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: unspecified vulnerability related to Server:Security:Encryption (CPU Jan 2015)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-RH6-RHOS-5.0:ceph-0:0.80.5-4.el6ost.src",
"6Server-RH6-RHOS-5.0:ceph-common-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:ceph-debuginfo-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:librados2-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:librbd1-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-0:5.5.41-1.el6ost.src",
"6Server-RH6-RHOS-5.0:mariadb-galera-common-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-debuginfo-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-server-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.noarch",
"6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.src",
"6Server-RH6-RHOS-5.0:python-ceph-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.noarch",
"6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.src",
"6Server-RH6-RHOS-5.0:python-novaclient-doc-1:2.17.0-4.el6ost.noarch",
"6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.noarch",
"6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.src",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.src",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-debuginfo-0:0.8.4-2.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.noarch",
"6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2015-0411"
},
{
"category": "external",
"summary": "RHBZ#1184560",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184560"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2015-0411",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0411"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-0411",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0411"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html#AppendixMSQL",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html#AppendixMSQL"
}
],
"release_date": "2015-01-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2015-04-16T14:28:41+00:00",
"details": "Before applying this update, ensure all previously released errata relevant to your system have been applied.\n\nRed Hat Enterprise Linux OpenStack Platform 5 runs on Red Hat Enterprise Linux 6.6.\n\nThe Red Hat Enterprise Linux OpenStack Platform 5 Release Notes (see References section) contain the following:\n* An explanation of the way in which the provided components interact to form a working cloud computing environment.\n* Technology Previews, Recommended Practices, and Known Issues.\n* The channels required for Red Hat Enterprise Linux OpenStack Platform 5, including which channels need to be enabled and disabled.\n\nThis update is available through the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258",
"product_ids": [
"6Server-RH6-RHOS-5.0:ceph-0:0.80.5-4.el6ost.src",
"6Server-RH6-RHOS-5.0:ceph-common-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:ceph-debuginfo-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:librados2-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:librbd1-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-0:5.5.41-1.el6ost.src",
"6Server-RH6-RHOS-5.0:mariadb-galera-common-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-debuginfo-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-server-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.noarch",
"6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.src",
"6Server-RH6-RHOS-5.0:python-ceph-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.noarch",
"6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.src",
"6Server-RH6-RHOS-5.0:python-novaclient-doc-1:2.17.0-4.el6ost.noarch",
"6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.noarch",
"6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.src",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.src",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-debuginfo-0:0.8.4-2.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.noarch",
"6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2015:0820"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"6Server-RH6-RHOS-5.0:ceph-0:0.80.5-4.el6ost.src",
"6Server-RH6-RHOS-5.0:ceph-common-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:ceph-debuginfo-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:librados2-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:librbd1-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-0:5.5.41-1.el6ost.src",
"6Server-RH6-RHOS-5.0:mariadb-galera-common-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-debuginfo-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-server-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.noarch",
"6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.src",
"6Server-RH6-RHOS-5.0:python-ceph-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.noarch",
"6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.src",
"6Server-RH6-RHOS-5.0:python-novaclient-doc-1:2.17.0-4.el6ost.noarch",
"6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.noarch",
"6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.src",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.src",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-debuginfo-0:0.8.4-2.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.noarch",
"6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: unspecified vulnerability related to Server:Security:Encryption (CPU Jan 2015)"
},
{
"cve": "CVE-2015-0432",
"discovery_date": "2015-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1184561"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier allows remote authenticated users to affect availability via vectors related to Server : InnoDB : DDL : Foreign Key.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: unspecified vulnerability related to Server:InnoDB:DDL:Foreign Key (CPU Jan 2015)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-RH6-RHOS-5.0:ceph-0:0.80.5-4.el6ost.src",
"6Server-RH6-RHOS-5.0:ceph-common-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:ceph-debuginfo-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:librados2-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:librbd1-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-0:5.5.41-1.el6ost.src",
"6Server-RH6-RHOS-5.0:mariadb-galera-common-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-debuginfo-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-server-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.noarch",
"6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.src",
"6Server-RH6-RHOS-5.0:python-ceph-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.noarch",
"6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.src",
"6Server-RH6-RHOS-5.0:python-novaclient-doc-1:2.17.0-4.el6ost.noarch",
"6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.noarch",
"6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.src",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.src",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-debuginfo-0:0.8.4-2.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.noarch",
"6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2015-0432"
},
{
"category": "external",
"summary": "RHBZ#1184561",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184561"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2015-0432",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0432"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-0432",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0432"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html#AppendixMSQL",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html#AppendixMSQL"
}
],
"release_date": "2015-01-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2015-04-16T14:28:41+00:00",
"details": "Before applying this update, ensure all previously released errata relevant to your system have been applied.\n\nRed Hat Enterprise Linux OpenStack Platform 5 runs on Red Hat Enterprise Linux 6.6.\n\nThe Red Hat Enterprise Linux OpenStack Platform 5 Release Notes (see References section) contain the following:\n* An explanation of the way in which the provided components interact to form a working cloud computing environment.\n* Technology Previews, Recommended Practices, and Known Issues.\n* The channels required for Red Hat Enterprise Linux OpenStack Platform 5, including which channels need to be enabled and disabled.\n\nThis update is available through the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258",
"product_ids": [
"6Server-RH6-RHOS-5.0:ceph-0:0.80.5-4.el6ost.src",
"6Server-RH6-RHOS-5.0:ceph-common-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:ceph-debuginfo-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:librados2-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:librbd1-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-0:5.5.41-1.el6ost.src",
"6Server-RH6-RHOS-5.0:mariadb-galera-common-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-debuginfo-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-server-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.noarch",
"6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.src",
"6Server-RH6-RHOS-5.0:python-ceph-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.noarch",
"6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.src",
"6Server-RH6-RHOS-5.0:python-novaclient-doc-1:2.17.0-4.el6ost.noarch",
"6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.noarch",
"6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.src",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.src",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-debuginfo-0:0.8.4-2.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.noarch",
"6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2015:0820"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"6Server-RH6-RHOS-5.0:ceph-0:0.80.5-4.el6ost.src",
"6Server-RH6-RHOS-5.0:ceph-common-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:ceph-debuginfo-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:librados2-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:librbd1-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-0:5.5.41-1.el6ost.src",
"6Server-RH6-RHOS-5.0:mariadb-galera-common-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-debuginfo-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-server-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.noarch",
"6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.src",
"6Server-RH6-RHOS-5.0:python-ceph-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.noarch",
"6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.src",
"6Server-RH6-RHOS-5.0:python-novaclient-doc-1:2.17.0-4.el6ost.noarch",
"6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.noarch",
"6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.src",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.src",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-debuginfo-0:0.8.4-2.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.noarch",
"6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: unspecified vulnerability related to Server:InnoDB:DDL:Foreign Key (CPU Jan 2015)"
}
]
}
RHBA-2015:0825
Vulnerability from csaf_redhat - Published: 2015-04-16 14:28 - Updated: 2026-01-13 21:13Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier, and 5.6.21 and earlier, allows remote authenticated users to affect availability via vectors related to Server : InnoDB : DML.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 7Server-RH7-RHOS-5.0:mariadb-galera-1:5.5.41-2.el7ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:mariadb-galera-common-1:5.5.41-2.el7ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:mariadb-galera-debuginfo-1:5.5.41-2.el7ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:mariadb-galera-server-1:5.5.41-2.el7ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:openstack-sahara-0:2014.1.3-3.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:openstack-sahara-0:2014.1.3-3.el7ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:openstack-sahara-doc-0:2014.1.3-3.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:openstack-selinux-0:0.6.25-1.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:openstack-selinux-0:0.6.25-1.el7ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:openstack-utils-0:2014.2-1.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:openstack-utils-0:2014.2-1.el7ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:python-novaclient-1:2.17.0-4.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:python-novaclient-1:2.17.0-4.el7ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:python-novaclient-doc-1:2.17.0-4.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:python-requests-0:2.3.0-3.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:python-requests-0:2.3.0-3.el7ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el7ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el7ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:python-sqlalchemy-debuginfo-0:0.8.4-2.el7ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:python-urllib3-0:1.8.2-5.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:python-urllib3-0:1.8.2-5.el7ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:rabbitmq-server-0:3.3.5-3.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:rabbitmq-server-0:3.3.5-3.el7ost.src | — |
Vendor Fix
fix
|
Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote authenticated users to affect confidentiality via unknown vectors related to Server : Security : Privileges : Foreign Key.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 7Server-RH7-RHOS-5.0:mariadb-galera-1:5.5.41-2.el7ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:mariadb-galera-common-1:5.5.41-2.el7ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:mariadb-galera-debuginfo-1:5.5.41-2.el7ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:mariadb-galera-server-1:5.5.41-2.el7ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:openstack-sahara-0:2014.1.3-3.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:openstack-sahara-0:2014.1.3-3.el7ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:openstack-sahara-doc-0:2014.1.3-3.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:openstack-selinux-0:0.6.25-1.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:openstack-selinux-0:0.6.25-1.el7ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:openstack-utils-0:2014.2-1.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:openstack-utils-0:2014.2-1.el7ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:python-novaclient-1:2.17.0-4.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:python-novaclient-1:2.17.0-4.el7ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:python-novaclient-doc-1:2.17.0-4.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:python-requests-0:2.3.0-3.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:python-requests-0:2.3.0-3.el7ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el7ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el7ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:python-sqlalchemy-debuginfo-0:0.8.4-2.el7ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:python-urllib3-0:1.8.2-5.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:python-urllib3-0:1.8.2-5.el7ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:rabbitmq-server-0:3.3.5-3.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:rabbitmq-server-0:3.3.5-3.el7ost.src | — |
Vendor Fix
fix
|
Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote attackers to affect availability via unknown vectors related to Server : Replication, a different vulnerability than CVE-2015-0382.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 7Server-RH7-RHOS-5.0:mariadb-galera-1:5.5.41-2.el7ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:mariadb-galera-common-1:5.5.41-2.el7ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:mariadb-galera-debuginfo-1:5.5.41-2.el7ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:mariadb-galera-server-1:5.5.41-2.el7ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:openstack-sahara-0:2014.1.3-3.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:openstack-sahara-0:2014.1.3-3.el7ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:openstack-sahara-doc-0:2014.1.3-3.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:openstack-selinux-0:0.6.25-1.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:openstack-selinux-0:0.6.25-1.el7ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:openstack-utils-0:2014.2-1.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:openstack-utils-0:2014.2-1.el7ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:python-novaclient-1:2.17.0-4.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:python-novaclient-1:2.17.0-4.el7ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:python-novaclient-doc-1:2.17.0-4.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:python-requests-0:2.3.0-3.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:python-requests-0:2.3.0-3.el7ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el7ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el7ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:python-sqlalchemy-debuginfo-0:0.8.4-2.el7ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:python-urllib3-0:1.8.2-5.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:python-urllib3-0:1.8.2-5.el7ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:rabbitmq-server-0:3.3.5-3.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:rabbitmq-server-0:3.3.5-3.el7ost.src | — |
Vendor Fix
fix
|
Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote attackers to affect availability via unknown vectors related to Server : Replication, a different vulnerability than CVE-2015-0381.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 7Server-RH7-RHOS-5.0:mariadb-galera-1:5.5.41-2.el7ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:mariadb-galera-common-1:5.5.41-2.el7ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:mariadb-galera-debuginfo-1:5.5.41-2.el7ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:mariadb-galera-server-1:5.5.41-2.el7ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:openstack-sahara-0:2014.1.3-3.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:openstack-sahara-0:2014.1.3-3.el7ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:openstack-sahara-doc-0:2014.1.3-3.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:openstack-selinux-0:0.6.25-1.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:openstack-selinux-0:0.6.25-1.el7ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:openstack-utils-0:2014.2-1.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:openstack-utils-0:2014.2-1.el7ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:python-novaclient-1:2.17.0-4.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:python-novaclient-1:2.17.0-4.el7ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:python-novaclient-doc-1:2.17.0-4.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:python-requests-0:2.3.0-3.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:python-requests-0:2.3.0-3.el7ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el7ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el7ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:python-sqlalchemy-debuginfo-0:0.8.4-2.el7ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:python-urllib3-0:1.8.2-5.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:python-urllib3-0:1.8.2-5.el7ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:rabbitmq-server-0:3.3.5-3.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:rabbitmq-server-0:3.3.5-3.el7ost.src | — |
Vendor Fix
fix
|
Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier, and 5.6.21 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Server : Security : Encryption.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 7Server-RH7-RHOS-5.0:mariadb-galera-1:5.5.41-2.el7ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:mariadb-galera-common-1:5.5.41-2.el7ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:mariadb-galera-debuginfo-1:5.5.41-2.el7ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:mariadb-galera-server-1:5.5.41-2.el7ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:openstack-sahara-0:2014.1.3-3.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:openstack-sahara-0:2014.1.3-3.el7ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:openstack-sahara-doc-0:2014.1.3-3.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:openstack-selinux-0:0.6.25-1.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:openstack-selinux-0:0.6.25-1.el7ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:openstack-utils-0:2014.2-1.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:openstack-utils-0:2014.2-1.el7ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:python-novaclient-1:2.17.0-4.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:python-novaclient-1:2.17.0-4.el7ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:python-novaclient-doc-1:2.17.0-4.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:python-requests-0:2.3.0-3.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:python-requests-0:2.3.0-3.el7ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el7ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el7ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:python-sqlalchemy-debuginfo-0:0.8.4-2.el7ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:python-urllib3-0:1.8.2-5.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:python-urllib3-0:1.8.2-5.el7ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:rabbitmq-server-0:3.3.5-3.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:rabbitmq-server-0:3.3.5-3.el7ost.src | — |
Vendor Fix
fix
|
Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier allows remote authenticated users to affect availability via vectors related to Server : InnoDB : DDL : Foreign Key.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 7Server-RH7-RHOS-5.0:mariadb-galera-1:5.5.41-2.el7ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:mariadb-galera-common-1:5.5.41-2.el7ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:mariadb-galera-debuginfo-1:5.5.41-2.el7ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:mariadb-galera-server-1:5.5.41-2.el7ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:openstack-sahara-0:2014.1.3-3.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:openstack-sahara-0:2014.1.3-3.el7ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:openstack-sahara-doc-0:2014.1.3-3.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:openstack-selinux-0:0.6.25-1.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:openstack-selinux-0:0.6.25-1.el7ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:openstack-utils-0:2014.2-1.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:openstack-utils-0:2014.2-1.el7ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:python-novaclient-1:2.17.0-4.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:python-novaclient-1:2.17.0-4.el7ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:python-novaclient-doc-1:2.17.0-4.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:python-requests-0:2.3.0-3.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:python-requests-0:2.3.0-3.el7ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el7ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el7ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:python-sqlalchemy-debuginfo-0:0.8.4-2.el7ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:python-urllib3-0:1.8.2-5.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:python-urllib3-0:1.8.2-5.el7ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:rabbitmq-server-0:3.3.5-3.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-5.0:rabbitmq-server-0:3.3.5-3.el7ost.src | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated packages that resolve various issues are now available for Red Hat\nEnterprise Linux OpenStack Platform 5.0 (Icehouse) for Red Hat Enterprise\nLinux 7.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Enterprise Linux OpenStack Platform provides the facilities for\nbuilding a private or public infrastructure-as-a-service (IaaS) cloud\nrunning on commonly available physical hardware.\n\nThis update addresses the following issues:\n\n* Previously, when swift client added a \u0027Content-Length\u0027 header and\nrequests implicitly added a \u0027content-length\u0027 header, requests sends both\nas separate headers. This caused Apache to reject the request with a\n400 error.\nWith this release, python-requests package is now rebased to version 2.3.0.\nThis version fixes the buggy implementation of case-insensitive mapping.\nAs a result, Apache no longer rejects requests with a 400\nerror. (BZ#1169530)\n\n* Previously, the log directory permissions for Sahara was set to 755,\nresulting in the Sahara service not conforming to the Red Hat log security\nstandards.\nWith this update, the directory permissions are modified to 750, thus,\nconforming to the Red Hat log security standards. (BZ#1163420)\n\n* Previously, SELinux prevented the nova scheduler from searching\ndirectories labeled \u0027cert_t\u0027, resulting in SELinux causing Compute to fail.\nWith this update, an \u0027allow\u0027 rule has been created to give the nova\nscheduler permission to search the \u0027cert_t\u0027 directories. As a result,\nCompute service functions normally. (BZ#1149975)\n\n* Previously, the \u0027nova list\u0027 was inefficient and took very long to\ncomplete as the number of instances increased.\nWith this update, \u0027nova list\u0027 command code has been optimized and uses\nserver-side filtering, resulting in faster response. (BZ#1147958)\n\n* If an existing haproxy process was already running before installing and\nrunning LBaaS (Load-Balancing-as-a-Service), attempting to start LBaaS will\nfail. This typically happens when upgrading to Red Hat Enterprise Linux\nOpenStack Platform 5 with an existing LBaaS service.\nTo work around this, you will have to kill the running haproxy process and\nrestart the LBaaS agent:\n# kill $(pgrep haproxy)\n# service neutron-lbaas-agent restart (BZ#1133920)\n\n* Previously, the rabbitmq-plugins command was not available in the\ndefault path. As a result, trying to run rabbitmq-plugins command would\nresult in a \u0027Command Not Found\u0027 error.\nWith this update, the rabbitmq-plugins command is added to the default\npath and it executes as expected. (BZ#1126680)\n\n* Previously, an improvement to the connection pool such that new\nconnections could be made concurrently made it so that the \u0027init on first\nconnect\u0027 routine of a SQLAlchemy dialect would not have been completed if\nconcurrent routines proceeded at the same time. As a result, when a\nSQLAlchemy engine was first used, operations which rely on the state\nacquired during initial startup could fail, as this information would not\nhave been completed.\nTo resolve this issue, with this update, \u0027mutexing\u0027 was added to the event\nsystem which handles the initial dialect startup phase, so that connection\nattempts are again serialized, but only when the engine first start\nup. (BZ#1121796)\n\n* Previously, SQLite database was created by a user who ran the database\nmanagement script, resulting in Sahara being unable to read the default\ndatabase without changing ownership of the database.\nWith this update, the file is not touched and the ownership is assigned to\nSahara (for only the default file location). As a result, Sahara now has\naccess to its database in the default flow. (BZ#1101516)\n\n* With this release, mariadb-galera is now rebased to version 5.5.41 fixing\nthe memory barrier problem in InnoDB/XtraDB mutex implementation causing\nthe server to stall or hang. (BZ#1168321)\n\nIn addition to the above issue, this update also addresses bugs and\nenhancements which can be found in the Red Hat Enterprise Linux OpenStack\nPlatform Technical Notes:\nhttps://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux_OpenStack_Platform/5/html/Technical_Notes/index.html",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHBA-2015:0825",
"url": "https://access.redhat.com/errata/RHBA-2015:0825"
},
{
"category": "external",
"summary": "https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux_OpenStack_Platform/5/html/Release_Notes/index.html",
"url": "https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux_OpenStack_Platform/5/html/Release_Notes/index.html"
},
{
"category": "external",
"summary": "1101516",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1101516"
},
{
"category": "external",
"summary": "1121796",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1121796"
},
{
"category": "external",
"summary": "1121798",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1121798"
},
{
"category": "external",
"summary": "1126680",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1126680"
},
{
"category": "external",
"summary": "1133920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1133920"
},
{
"category": "external",
"summary": "1139413",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1139413"
},
{
"category": "external",
"summary": "1149975",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1149975"
},
{
"category": "external",
"summary": "1163420",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1163420"
},
{
"category": "external",
"summary": "1168321",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1168321"
},
{
"category": "external",
"summary": "1169530",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1169530"
},
{
"category": "external",
"summary": "1199249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1199249"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhba-2015_0825.json"
}
],
"title": "Red Hat Bug Fix Advisory: Red Hat Enterprise Linux OpenStack Platform Bug Fix and Enhancement Advisory",
"tracking": {
"current_release_date": "2026-01-13T21:13:49+00:00",
"generator": {
"date": "2026-01-13T21:13:49+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.15"
}
},
"id": "RHBA-2015:0825",
"initial_release_date": "2015-04-16T14:28:14+00:00",
"revision_history": [
{
"date": "2015-04-16T14:28:14+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2015-04-16T14:28:14+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-13T21:13:49+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7",
"product": {
"name": "Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7",
"product_id": "7Server-RH7-RHOS-5.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openstack:5::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenStack Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "python-sqlalchemy-0:0.8.4-2.el7ost.src",
"product": {
"name": "python-sqlalchemy-0:0.8.4-2.el7ost.src",
"product_id": "python-sqlalchemy-0:0.8.4-2.el7ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-sqlalchemy@0.8.4-2.el7ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "rabbitmq-server-0:3.3.5-3.el7ost.src",
"product": {
"name": "rabbitmq-server-0:3.3.5-3.el7ost.src",
"product_id": "rabbitmq-server-0:3.3.5-3.el7ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rabbitmq-server@3.3.5-3.el7ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-requests-0:2.3.0-3.el7ost.src",
"product": {
"name": "python-requests-0:2.3.0-3.el7ost.src",
"product_id": "python-requests-0:2.3.0-3.el7ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-requests@2.3.0-3.el7ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "openstack-utils-0:2014.2-1.el7ost.src",
"product": {
"name": "openstack-utils-0:2014.2-1.el7ost.src",
"product_id": "openstack-utils-0:2014.2-1.el7ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-utils@2014.2-1.el7ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "openstack-sahara-0:2014.1.3-3.el7ost.src",
"product": {
"name": "openstack-sahara-0:2014.1.3-3.el7ost.src",
"product_id": "openstack-sahara-0:2014.1.3-3.el7ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-sahara@2014.1.3-3.el7ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-novaclient-1:2.17.0-4.el7ost.src",
"product": {
"name": "python-novaclient-1:2.17.0-4.el7ost.src",
"product_id": "python-novaclient-1:2.17.0-4.el7ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-novaclient@2.17.0-4.el7ost?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openstack-selinux-0:0.6.25-1.el7ost.src",
"product": {
"name": "openstack-selinux-0:0.6.25-1.el7ost.src",
"product_id": "openstack-selinux-0:0.6.25-1.el7ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-selinux@0.6.25-1.el7ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-urllib3-0:1.8.2-5.el7ost.src",
"product": {
"name": "python-urllib3-0:1.8.2-5.el7ost.src",
"product_id": "python-urllib3-0:1.8.2-5.el7ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-urllib3@1.8.2-5.el7ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "mariadb-galera-1:5.5.41-2.el7ost.src",
"product": {
"name": "mariadb-galera-1:5.5.41-2.el7ost.src",
"product_id": "mariadb-galera-1:5.5.41-2.el7ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mariadb-galera@5.5.41-2.el7ost?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python-sqlalchemy-0:0.8.4-2.el7ost.x86_64",
"product": {
"name": "python-sqlalchemy-0:0.8.4-2.el7ost.x86_64",
"product_id": "python-sqlalchemy-0:0.8.4-2.el7ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-sqlalchemy@0.8.4-2.el7ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-sqlalchemy-debuginfo-0:0.8.4-2.el7ost.x86_64",
"product": {
"name": "python-sqlalchemy-debuginfo-0:0.8.4-2.el7ost.x86_64",
"product_id": "python-sqlalchemy-debuginfo-0:0.8.4-2.el7ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-sqlalchemy-debuginfo@0.8.4-2.el7ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mariadb-galera-debuginfo-1:5.5.41-2.el7ost.x86_64",
"product": {
"name": "mariadb-galera-debuginfo-1:5.5.41-2.el7ost.x86_64",
"product_id": "mariadb-galera-debuginfo-1:5.5.41-2.el7ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mariadb-galera-debuginfo@5.5.41-2.el7ost?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mariadb-galera-common-1:5.5.41-2.el7ost.x86_64",
"product": {
"name": "mariadb-galera-common-1:5.5.41-2.el7ost.x86_64",
"product_id": "mariadb-galera-common-1:5.5.41-2.el7ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mariadb-galera-common@5.5.41-2.el7ost?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mariadb-galera-server-1:5.5.41-2.el7ost.x86_64",
"product": {
"name": "mariadb-galera-server-1:5.5.41-2.el7ost.x86_64",
"product_id": "mariadb-galera-server-1:5.5.41-2.el7ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mariadb-galera-server@5.5.41-2.el7ost?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "rabbitmq-server-0:3.3.5-3.el7ost.noarch",
"product": {
"name": "rabbitmq-server-0:3.3.5-3.el7ost.noarch",
"product_id": "rabbitmq-server-0:3.3.5-3.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rabbitmq-server@3.3.5-3.el7ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python-requests-0:2.3.0-3.el7ost.noarch",
"product": {
"name": "python-requests-0:2.3.0-3.el7ost.noarch",
"product_id": "python-requests-0:2.3.0-3.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-requests@2.3.0-3.el7ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openstack-utils-0:2014.2-1.el7ost.noarch",
"product": {
"name": "openstack-utils-0:2014.2-1.el7ost.noarch",
"product_id": "openstack-utils-0:2014.2-1.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-utils@2014.2-1.el7ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openstack-sahara-doc-0:2014.1.3-3.el7ost.noarch",
"product": {
"name": "openstack-sahara-doc-0:2014.1.3-3.el7ost.noarch",
"product_id": "openstack-sahara-doc-0:2014.1.3-3.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-sahara-doc@2014.1.3-3.el7ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openstack-sahara-0:2014.1.3-3.el7ost.noarch",
"product": {
"name": "openstack-sahara-0:2014.1.3-3.el7ost.noarch",
"product_id": "openstack-sahara-0:2014.1.3-3.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-sahara@2014.1.3-3.el7ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python-novaclient-doc-1:2.17.0-4.el7ost.noarch",
"product": {
"name": "python-novaclient-doc-1:2.17.0-4.el7ost.noarch",
"product_id": "python-novaclient-doc-1:2.17.0-4.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-novaclient-doc@2.17.0-4.el7ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "python-novaclient-1:2.17.0-4.el7ost.noarch",
"product": {
"name": "python-novaclient-1:2.17.0-4.el7ost.noarch",
"product_id": "python-novaclient-1:2.17.0-4.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-novaclient@2.17.0-4.el7ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openstack-selinux-0:0.6.25-1.el7ost.noarch",
"product": {
"name": "openstack-selinux-0:0.6.25-1.el7ost.noarch",
"product_id": "openstack-selinux-0:0.6.25-1.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-selinux@0.6.25-1.el7ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python-urllib3-0:1.8.2-5.el7ost.noarch",
"product": {
"name": "python-urllib3-0:1.8.2-5.el7ost.noarch",
"product_id": "python-urllib3-0:1.8.2-5.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-urllib3@1.8.2-5.el7ost?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "mariadb-galera-1:5.5.41-2.el7ost.src as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7",
"product_id": "7Server-RH7-RHOS-5.0:mariadb-galera-1:5.5.41-2.el7ost.src"
},
"product_reference": "mariadb-galera-1:5.5.41-2.el7ost.src",
"relates_to_product_reference": "7Server-RH7-RHOS-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mariadb-galera-common-1:5.5.41-2.el7ost.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7",
"product_id": "7Server-RH7-RHOS-5.0:mariadb-galera-common-1:5.5.41-2.el7ost.x86_64"
},
"product_reference": "mariadb-galera-common-1:5.5.41-2.el7ost.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOS-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mariadb-galera-debuginfo-1:5.5.41-2.el7ost.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7",
"product_id": "7Server-RH7-RHOS-5.0:mariadb-galera-debuginfo-1:5.5.41-2.el7ost.x86_64"
},
"product_reference": "mariadb-galera-debuginfo-1:5.5.41-2.el7ost.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOS-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mariadb-galera-server-1:5.5.41-2.el7ost.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7",
"product_id": "7Server-RH7-RHOS-5.0:mariadb-galera-server-1:5.5.41-2.el7ost.x86_64"
},
"product_reference": "mariadb-galera-server-1:5.5.41-2.el7ost.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOS-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-sahara-0:2014.1.3-3.el7ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7",
"product_id": "7Server-RH7-RHOS-5.0:openstack-sahara-0:2014.1.3-3.el7ost.noarch"
},
"product_reference": "openstack-sahara-0:2014.1.3-3.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-sahara-0:2014.1.3-3.el7ost.src as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7",
"product_id": "7Server-RH7-RHOS-5.0:openstack-sahara-0:2014.1.3-3.el7ost.src"
},
"product_reference": "openstack-sahara-0:2014.1.3-3.el7ost.src",
"relates_to_product_reference": "7Server-RH7-RHOS-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-sahara-doc-0:2014.1.3-3.el7ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7",
"product_id": "7Server-RH7-RHOS-5.0:openstack-sahara-doc-0:2014.1.3-3.el7ost.noarch"
},
"product_reference": "openstack-sahara-doc-0:2014.1.3-3.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-selinux-0:0.6.25-1.el7ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7",
"product_id": "7Server-RH7-RHOS-5.0:openstack-selinux-0:0.6.25-1.el7ost.noarch"
},
"product_reference": "openstack-selinux-0:0.6.25-1.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-selinux-0:0.6.25-1.el7ost.src as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7",
"product_id": "7Server-RH7-RHOS-5.0:openstack-selinux-0:0.6.25-1.el7ost.src"
},
"product_reference": "openstack-selinux-0:0.6.25-1.el7ost.src",
"relates_to_product_reference": "7Server-RH7-RHOS-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-utils-0:2014.2-1.el7ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7",
"product_id": "7Server-RH7-RHOS-5.0:openstack-utils-0:2014.2-1.el7ost.noarch"
},
"product_reference": "openstack-utils-0:2014.2-1.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-utils-0:2014.2-1.el7ost.src as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7",
"product_id": "7Server-RH7-RHOS-5.0:openstack-utils-0:2014.2-1.el7ost.src"
},
"product_reference": "openstack-utils-0:2014.2-1.el7ost.src",
"relates_to_product_reference": "7Server-RH7-RHOS-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-novaclient-1:2.17.0-4.el7ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7",
"product_id": "7Server-RH7-RHOS-5.0:python-novaclient-1:2.17.0-4.el7ost.noarch"
},
"product_reference": "python-novaclient-1:2.17.0-4.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-novaclient-1:2.17.0-4.el7ost.src as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7",
"product_id": "7Server-RH7-RHOS-5.0:python-novaclient-1:2.17.0-4.el7ost.src"
},
"product_reference": "python-novaclient-1:2.17.0-4.el7ost.src",
"relates_to_product_reference": "7Server-RH7-RHOS-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-novaclient-doc-1:2.17.0-4.el7ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7",
"product_id": "7Server-RH7-RHOS-5.0:python-novaclient-doc-1:2.17.0-4.el7ost.noarch"
},
"product_reference": "python-novaclient-doc-1:2.17.0-4.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-requests-0:2.3.0-3.el7ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7",
"product_id": "7Server-RH7-RHOS-5.0:python-requests-0:2.3.0-3.el7ost.noarch"
},
"product_reference": "python-requests-0:2.3.0-3.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-requests-0:2.3.0-3.el7ost.src as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7",
"product_id": "7Server-RH7-RHOS-5.0:python-requests-0:2.3.0-3.el7ost.src"
},
"product_reference": "python-requests-0:2.3.0-3.el7ost.src",
"relates_to_product_reference": "7Server-RH7-RHOS-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-sqlalchemy-0:0.8.4-2.el7ost.src as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7",
"product_id": "7Server-RH7-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el7ost.src"
},
"product_reference": "python-sqlalchemy-0:0.8.4-2.el7ost.src",
"relates_to_product_reference": "7Server-RH7-RHOS-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-sqlalchemy-0:0.8.4-2.el7ost.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7",
"product_id": "7Server-RH7-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el7ost.x86_64"
},
"product_reference": "python-sqlalchemy-0:0.8.4-2.el7ost.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOS-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-sqlalchemy-debuginfo-0:0.8.4-2.el7ost.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7",
"product_id": "7Server-RH7-RHOS-5.0:python-sqlalchemy-debuginfo-0:0.8.4-2.el7ost.x86_64"
},
"product_reference": "python-sqlalchemy-debuginfo-0:0.8.4-2.el7ost.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOS-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-urllib3-0:1.8.2-5.el7ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7",
"product_id": "7Server-RH7-RHOS-5.0:python-urllib3-0:1.8.2-5.el7ost.noarch"
},
"product_reference": "python-urllib3-0:1.8.2-5.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-urllib3-0:1.8.2-5.el7ost.src as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7",
"product_id": "7Server-RH7-RHOS-5.0:python-urllib3-0:1.8.2-5.el7ost.src"
},
"product_reference": "python-urllib3-0:1.8.2-5.el7ost.src",
"relates_to_product_reference": "7Server-RH7-RHOS-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rabbitmq-server-0:3.3.5-3.el7ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7",
"product_id": "7Server-RH7-RHOS-5.0:rabbitmq-server-0:3.3.5-3.el7ost.noarch"
},
"product_reference": "rabbitmq-server-0:3.3.5-3.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rabbitmq-server-0:3.3.5-3.el7ost.src as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7",
"product_id": "7Server-RH7-RHOS-5.0:rabbitmq-server-0:3.3.5-3.el7ost.src"
},
"product_reference": "rabbitmq-server-0:3.3.5-3.el7ost.src",
"relates_to_product_reference": "7Server-RH7-RHOS-5.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2014-6568",
"discovery_date": "2015-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1184552"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier, and 5.6.21 and earlier, allows remote authenticated users to affect availability via vectors related to Server : InnoDB : DML.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: unspecified vulnerability related to Server:InnoDB:DML (CPU Jan 2015)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOS-5.0:mariadb-galera-1:5.5.41-2.el7ost.src",
"7Server-RH7-RHOS-5.0:mariadb-galera-common-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:mariadb-galera-debuginfo-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:mariadb-galera-server-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:openstack-sahara-0:2014.1.3-3.el7ost.noarch",
"7Server-RH7-RHOS-5.0:openstack-sahara-0:2014.1.3-3.el7ost.src",
"7Server-RH7-RHOS-5.0:openstack-sahara-doc-0:2014.1.3-3.el7ost.noarch",
"7Server-RH7-RHOS-5.0:openstack-selinux-0:0.6.25-1.el7ost.noarch",
"7Server-RH7-RHOS-5.0:openstack-selinux-0:0.6.25-1.el7ost.src",
"7Server-RH7-RHOS-5.0:openstack-utils-0:2014.2-1.el7ost.noarch",
"7Server-RH7-RHOS-5.0:openstack-utils-0:2014.2-1.el7ost.src",
"7Server-RH7-RHOS-5.0:python-novaclient-1:2.17.0-4.el7ost.noarch",
"7Server-RH7-RHOS-5.0:python-novaclient-1:2.17.0-4.el7ost.src",
"7Server-RH7-RHOS-5.0:python-novaclient-doc-1:2.17.0-4.el7ost.noarch",
"7Server-RH7-RHOS-5.0:python-requests-0:2.3.0-3.el7ost.noarch",
"7Server-RH7-RHOS-5.0:python-requests-0:2.3.0-3.el7ost.src",
"7Server-RH7-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el7ost.src",
"7Server-RH7-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:python-sqlalchemy-debuginfo-0:0.8.4-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:python-urllib3-0:1.8.2-5.el7ost.noarch",
"7Server-RH7-RHOS-5.0:python-urllib3-0:1.8.2-5.el7ost.src",
"7Server-RH7-RHOS-5.0:rabbitmq-server-0:3.3.5-3.el7ost.noarch",
"7Server-RH7-RHOS-5.0:rabbitmq-server-0:3.3.5-3.el7ost.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-6568"
},
{
"category": "external",
"summary": "RHBZ#1184552",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184552"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-6568",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6568"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-6568",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6568"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html#AppendixMSQL",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html#AppendixMSQL"
}
],
"release_date": "2015-01-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2015-04-16T14:28:14+00:00",
"details": "Before applying this update, ensure all previously released errata relevant\nto your system have been applied.\n\nRed Hat Enterprise Linux OpenStack Platform 5 for RHEL 7 runs on Red Hat\nEnterprise Linux 7.1.\n\nThe Red Hat Enterprise Linux OpenStack Platform 5 for RHEL 7 Release Notes\n(see References section) contain the following:\n* An explanation of the way in which the provided components interact to\nform a working cloud computing environment.\n* Technology Previews, Recommended Practices, and Known Issues.\n* The channels required for Red Hat Enterprise Linux OpenStack Platform 5\nfor RHEL 7, including which channels need to be enabled and disabled.\n\nFor details on how to apply this update, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RH7-RHOS-5.0:mariadb-galera-1:5.5.41-2.el7ost.src",
"7Server-RH7-RHOS-5.0:mariadb-galera-common-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:mariadb-galera-debuginfo-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:mariadb-galera-server-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:openstack-sahara-0:2014.1.3-3.el7ost.noarch",
"7Server-RH7-RHOS-5.0:openstack-sahara-0:2014.1.3-3.el7ost.src",
"7Server-RH7-RHOS-5.0:openstack-sahara-doc-0:2014.1.3-3.el7ost.noarch",
"7Server-RH7-RHOS-5.0:openstack-selinux-0:0.6.25-1.el7ost.noarch",
"7Server-RH7-RHOS-5.0:openstack-selinux-0:0.6.25-1.el7ost.src",
"7Server-RH7-RHOS-5.0:openstack-utils-0:2014.2-1.el7ost.noarch",
"7Server-RH7-RHOS-5.0:openstack-utils-0:2014.2-1.el7ost.src",
"7Server-RH7-RHOS-5.0:python-novaclient-1:2.17.0-4.el7ost.noarch",
"7Server-RH7-RHOS-5.0:python-novaclient-1:2.17.0-4.el7ost.src",
"7Server-RH7-RHOS-5.0:python-novaclient-doc-1:2.17.0-4.el7ost.noarch",
"7Server-RH7-RHOS-5.0:python-requests-0:2.3.0-3.el7ost.noarch",
"7Server-RH7-RHOS-5.0:python-requests-0:2.3.0-3.el7ost.src",
"7Server-RH7-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el7ost.src",
"7Server-RH7-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:python-sqlalchemy-debuginfo-0:0.8.4-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:python-urllib3-0:1.8.2-5.el7ost.noarch",
"7Server-RH7-RHOS-5.0:python-urllib3-0:1.8.2-5.el7ost.src",
"7Server-RH7-RHOS-5.0:rabbitmq-server-0:3.3.5-3.el7ost.noarch",
"7Server-RH7-RHOS-5.0:rabbitmq-server-0:3.3.5-3.el7ost.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2015:0825"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"7Server-RH7-RHOS-5.0:mariadb-galera-1:5.5.41-2.el7ost.src",
"7Server-RH7-RHOS-5.0:mariadb-galera-common-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:mariadb-galera-debuginfo-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:mariadb-galera-server-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:openstack-sahara-0:2014.1.3-3.el7ost.noarch",
"7Server-RH7-RHOS-5.0:openstack-sahara-0:2014.1.3-3.el7ost.src",
"7Server-RH7-RHOS-5.0:openstack-sahara-doc-0:2014.1.3-3.el7ost.noarch",
"7Server-RH7-RHOS-5.0:openstack-selinux-0:0.6.25-1.el7ost.noarch",
"7Server-RH7-RHOS-5.0:openstack-selinux-0:0.6.25-1.el7ost.src",
"7Server-RH7-RHOS-5.0:openstack-utils-0:2014.2-1.el7ost.noarch",
"7Server-RH7-RHOS-5.0:openstack-utils-0:2014.2-1.el7ost.src",
"7Server-RH7-RHOS-5.0:python-novaclient-1:2.17.0-4.el7ost.noarch",
"7Server-RH7-RHOS-5.0:python-novaclient-1:2.17.0-4.el7ost.src",
"7Server-RH7-RHOS-5.0:python-novaclient-doc-1:2.17.0-4.el7ost.noarch",
"7Server-RH7-RHOS-5.0:python-requests-0:2.3.0-3.el7ost.noarch",
"7Server-RH7-RHOS-5.0:python-requests-0:2.3.0-3.el7ost.src",
"7Server-RH7-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el7ost.src",
"7Server-RH7-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:python-sqlalchemy-debuginfo-0:0.8.4-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:python-urllib3-0:1.8.2-5.el7ost.noarch",
"7Server-RH7-RHOS-5.0:python-urllib3-0:1.8.2-5.el7ost.src",
"7Server-RH7-RHOS-5.0:rabbitmq-server-0:3.3.5-3.el7ost.noarch",
"7Server-RH7-RHOS-5.0:rabbitmq-server-0:3.3.5-3.el7ost.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "mysql: unspecified vulnerability related to Server:InnoDB:DML (CPU Jan 2015)"
},
{
"cve": "CVE-2015-0374",
"discovery_date": "2015-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1184553"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote authenticated users to affect confidentiality via unknown vectors related to Server : Security : Privileges : Foreign Key.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: unspecified vulnerability related to Server:Security:Privileges:Foreign Key (CPU Jan 2015)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOS-5.0:mariadb-galera-1:5.5.41-2.el7ost.src",
"7Server-RH7-RHOS-5.0:mariadb-galera-common-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:mariadb-galera-debuginfo-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:mariadb-galera-server-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:openstack-sahara-0:2014.1.3-3.el7ost.noarch",
"7Server-RH7-RHOS-5.0:openstack-sahara-0:2014.1.3-3.el7ost.src",
"7Server-RH7-RHOS-5.0:openstack-sahara-doc-0:2014.1.3-3.el7ost.noarch",
"7Server-RH7-RHOS-5.0:openstack-selinux-0:0.6.25-1.el7ost.noarch",
"7Server-RH7-RHOS-5.0:openstack-selinux-0:0.6.25-1.el7ost.src",
"7Server-RH7-RHOS-5.0:openstack-utils-0:2014.2-1.el7ost.noarch",
"7Server-RH7-RHOS-5.0:openstack-utils-0:2014.2-1.el7ost.src",
"7Server-RH7-RHOS-5.0:python-novaclient-1:2.17.0-4.el7ost.noarch",
"7Server-RH7-RHOS-5.0:python-novaclient-1:2.17.0-4.el7ost.src",
"7Server-RH7-RHOS-5.0:python-novaclient-doc-1:2.17.0-4.el7ost.noarch",
"7Server-RH7-RHOS-5.0:python-requests-0:2.3.0-3.el7ost.noarch",
"7Server-RH7-RHOS-5.0:python-requests-0:2.3.0-3.el7ost.src",
"7Server-RH7-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el7ost.src",
"7Server-RH7-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:python-sqlalchemy-debuginfo-0:0.8.4-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:python-urllib3-0:1.8.2-5.el7ost.noarch",
"7Server-RH7-RHOS-5.0:python-urllib3-0:1.8.2-5.el7ost.src",
"7Server-RH7-RHOS-5.0:rabbitmq-server-0:3.3.5-3.el7ost.noarch",
"7Server-RH7-RHOS-5.0:rabbitmq-server-0:3.3.5-3.el7ost.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2015-0374"
},
{
"category": "external",
"summary": "RHBZ#1184553",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184553"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2015-0374",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0374"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-0374",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0374"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html#AppendixMSQL",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html#AppendixMSQL"
}
],
"release_date": "2015-01-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2015-04-16T14:28:14+00:00",
"details": "Before applying this update, ensure all previously released errata relevant\nto your system have been applied.\n\nRed Hat Enterprise Linux OpenStack Platform 5 for RHEL 7 runs on Red Hat\nEnterprise Linux 7.1.\n\nThe Red Hat Enterprise Linux OpenStack Platform 5 for RHEL 7 Release Notes\n(see References section) contain the following:\n* An explanation of the way in which the provided components interact to\nform a working cloud computing environment.\n* Technology Previews, Recommended Practices, and Known Issues.\n* The channels required for Red Hat Enterprise Linux OpenStack Platform 5\nfor RHEL 7, including which channels need to be enabled and disabled.\n\nFor details on how to apply this update, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RH7-RHOS-5.0:mariadb-galera-1:5.5.41-2.el7ost.src",
"7Server-RH7-RHOS-5.0:mariadb-galera-common-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:mariadb-galera-debuginfo-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:mariadb-galera-server-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:openstack-sahara-0:2014.1.3-3.el7ost.noarch",
"7Server-RH7-RHOS-5.0:openstack-sahara-0:2014.1.3-3.el7ost.src",
"7Server-RH7-RHOS-5.0:openstack-sahara-doc-0:2014.1.3-3.el7ost.noarch",
"7Server-RH7-RHOS-5.0:openstack-selinux-0:0.6.25-1.el7ost.noarch",
"7Server-RH7-RHOS-5.0:openstack-selinux-0:0.6.25-1.el7ost.src",
"7Server-RH7-RHOS-5.0:openstack-utils-0:2014.2-1.el7ost.noarch",
"7Server-RH7-RHOS-5.0:openstack-utils-0:2014.2-1.el7ost.src",
"7Server-RH7-RHOS-5.0:python-novaclient-1:2.17.0-4.el7ost.noarch",
"7Server-RH7-RHOS-5.0:python-novaclient-1:2.17.0-4.el7ost.src",
"7Server-RH7-RHOS-5.0:python-novaclient-doc-1:2.17.0-4.el7ost.noarch",
"7Server-RH7-RHOS-5.0:python-requests-0:2.3.0-3.el7ost.noarch",
"7Server-RH7-RHOS-5.0:python-requests-0:2.3.0-3.el7ost.src",
"7Server-RH7-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el7ost.src",
"7Server-RH7-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:python-sqlalchemy-debuginfo-0:0.8.4-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:python-urllib3-0:1.8.2-5.el7ost.noarch",
"7Server-RH7-RHOS-5.0:python-urllib3-0:1.8.2-5.el7ost.src",
"7Server-RH7-RHOS-5.0:rabbitmq-server-0:3.3.5-3.el7ost.noarch",
"7Server-RH7-RHOS-5.0:rabbitmq-server-0:3.3.5-3.el7ost.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2015:0825"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"7Server-RH7-RHOS-5.0:mariadb-galera-1:5.5.41-2.el7ost.src",
"7Server-RH7-RHOS-5.0:mariadb-galera-common-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:mariadb-galera-debuginfo-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:mariadb-galera-server-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:openstack-sahara-0:2014.1.3-3.el7ost.noarch",
"7Server-RH7-RHOS-5.0:openstack-sahara-0:2014.1.3-3.el7ost.src",
"7Server-RH7-RHOS-5.0:openstack-sahara-doc-0:2014.1.3-3.el7ost.noarch",
"7Server-RH7-RHOS-5.0:openstack-selinux-0:0.6.25-1.el7ost.noarch",
"7Server-RH7-RHOS-5.0:openstack-selinux-0:0.6.25-1.el7ost.src",
"7Server-RH7-RHOS-5.0:openstack-utils-0:2014.2-1.el7ost.noarch",
"7Server-RH7-RHOS-5.0:openstack-utils-0:2014.2-1.el7ost.src",
"7Server-RH7-RHOS-5.0:python-novaclient-1:2.17.0-4.el7ost.noarch",
"7Server-RH7-RHOS-5.0:python-novaclient-1:2.17.0-4.el7ost.src",
"7Server-RH7-RHOS-5.0:python-novaclient-doc-1:2.17.0-4.el7ost.noarch",
"7Server-RH7-RHOS-5.0:python-requests-0:2.3.0-3.el7ost.noarch",
"7Server-RH7-RHOS-5.0:python-requests-0:2.3.0-3.el7ost.src",
"7Server-RH7-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el7ost.src",
"7Server-RH7-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:python-sqlalchemy-debuginfo-0:0.8.4-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:python-urllib3-0:1.8.2-5.el7ost.noarch",
"7Server-RH7-RHOS-5.0:python-urllib3-0:1.8.2-5.el7ost.src",
"7Server-RH7-RHOS-5.0:rabbitmq-server-0:3.3.5-3.el7ost.noarch",
"7Server-RH7-RHOS-5.0:rabbitmq-server-0:3.3.5-3.el7ost.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "mysql: unspecified vulnerability related to Server:Security:Privileges:Foreign Key (CPU Jan 2015)"
},
{
"cve": "CVE-2015-0381",
"discovery_date": "2015-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1184554"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote attackers to affect availability via unknown vectors related to Server : Replication, a different vulnerability than CVE-2015-0382.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: unspecified vulnerability related to Server:Replication (CPU Jan 2015)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOS-5.0:mariadb-galera-1:5.5.41-2.el7ost.src",
"7Server-RH7-RHOS-5.0:mariadb-galera-common-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:mariadb-galera-debuginfo-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:mariadb-galera-server-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:openstack-sahara-0:2014.1.3-3.el7ost.noarch",
"7Server-RH7-RHOS-5.0:openstack-sahara-0:2014.1.3-3.el7ost.src",
"7Server-RH7-RHOS-5.0:openstack-sahara-doc-0:2014.1.3-3.el7ost.noarch",
"7Server-RH7-RHOS-5.0:openstack-selinux-0:0.6.25-1.el7ost.noarch",
"7Server-RH7-RHOS-5.0:openstack-selinux-0:0.6.25-1.el7ost.src",
"7Server-RH7-RHOS-5.0:openstack-utils-0:2014.2-1.el7ost.noarch",
"7Server-RH7-RHOS-5.0:openstack-utils-0:2014.2-1.el7ost.src",
"7Server-RH7-RHOS-5.0:python-novaclient-1:2.17.0-4.el7ost.noarch",
"7Server-RH7-RHOS-5.0:python-novaclient-1:2.17.0-4.el7ost.src",
"7Server-RH7-RHOS-5.0:python-novaclient-doc-1:2.17.0-4.el7ost.noarch",
"7Server-RH7-RHOS-5.0:python-requests-0:2.3.0-3.el7ost.noarch",
"7Server-RH7-RHOS-5.0:python-requests-0:2.3.0-3.el7ost.src",
"7Server-RH7-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el7ost.src",
"7Server-RH7-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:python-sqlalchemy-debuginfo-0:0.8.4-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:python-urllib3-0:1.8.2-5.el7ost.noarch",
"7Server-RH7-RHOS-5.0:python-urllib3-0:1.8.2-5.el7ost.src",
"7Server-RH7-RHOS-5.0:rabbitmq-server-0:3.3.5-3.el7ost.noarch",
"7Server-RH7-RHOS-5.0:rabbitmq-server-0:3.3.5-3.el7ost.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2015-0381"
},
{
"category": "external",
"summary": "RHBZ#1184554",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184554"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2015-0381",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0381"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-0381",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0381"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html#AppendixMSQL",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html#AppendixMSQL"
}
],
"release_date": "2015-01-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2015-04-16T14:28:14+00:00",
"details": "Before applying this update, ensure all previously released errata relevant\nto your system have been applied.\n\nRed Hat Enterprise Linux OpenStack Platform 5 for RHEL 7 runs on Red Hat\nEnterprise Linux 7.1.\n\nThe Red Hat Enterprise Linux OpenStack Platform 5 for RHEL 7 Release Notes\n(see References section) contain the following:\n* An explanation of the way in which the provided components interact to\nform a working cloud computing environment.\n* Technology Previews, Recommended Practices, and Known Issues.\n* The channels required for Red Hat Enterprise Linux OpenStack Platform 5\nfor RHEL 7, including which channels need to be enabled and disabled.\n\nFor details on how to apply this update, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RH7-RHOS-5.0:mariadb-galera-1:5.5.41-2.el7ost.src",
"7Server-RH7-RHOS-5.0:mariadb-galera-common-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:mariadb-galera-debuginfo-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:mariadb-galera-server-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:openstack-sahara-0:2014.1.3-3.el7ost.noarch",
"7Server-RH7-RHOS-5.0:openstack-sahara-0:2014.1.3-3.el7ost.src",
"7Server-RH7-RHOS-5.0:openstack-sahara-doc-0:2014.1.3-3.el7ost.noarch",
"7Server-RH7-RHOS-5.0:openstack-selinux-0:0.6.25-1.el7ost.noarch",
"7Server-RH7-RHOS-5.0:openstack-selinux-0:0.6.25-1.el7ost.src",
"7Server-RH7-RHOS-5.0:openstack-utils-0:2014.2-1.el7ost.noarch",
"7Server-RH7-RHOS-5.0:openstack-utils-0:2014.2-1.el7ost.src",
"7Server-RH7-RHOS-5.0:python-novaclient-1:2.17.0-4.el7ost.noarch",
"7Server-RH7-RHOS-5.0:python-novaclient-1:2.17.0-4.el7ost.src",
"7Server-RH7-RHOS-5.0:python-novaclient-doc-1:2.17.0-4.el7ost.noarch",
"7Server-RH7-RHOS-5.0:python-requests-0:2.3.0-3.el7ost.noarch",
"7Server-RH7-RHOS-5.0:python-requests-0:2.3.0-3.el7ost.src",
"7Server-RH7-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el7ost.src",
"7Server-RH7-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:python-sqlalchemy-debuginfo-0:0.8.4-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:python-urllib3-0:1.8.2-5.el7ost.noarch",
"7Server-RH7-RHOS-5.0:python-urllib3-0:1.8.2-5.el7ost.src",
"7Server-RH7-RHOS-5.0:rabbitmq-server-0:3.3.5-3.el7ost.noarch",
"7Server-RH7-RHOS-5.0:rabbitmq-server-0:3.3.5-3.el7ost.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2015:0825"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"7Server-RH7-RHOS-5.0:mariadb-galera-1:5.5.41-2.el7ost.src",
"7Server-RH7-RHOS-5.0:mariadb-galera-common-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:mariadb-galera-debuginfo-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:mariadb-galera-server-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:openstack-sahara-0:2014.1.3-3.el7ost.noarch",
"7Server-RH7-RHOS-5.0:openstack-sahara-0:2014.1.3-3.el7ost.src",
"7Server-RH7-RHOS-5.0:openstack-sahara-doc-0:2014.1.3-3.el7ost.noarch",
"7Server-RH7-RHOS-5.0:openstack-selinux-0:0.6.25-1.el7ost.noarch",
"7Server-RH7-RHOS-5.0:openstack-selinux-0:0.6.25-1.el7ost.src",
"7Server-RH7-RHOS-5.0:openstack-utils-0:2014.2-1.el7ost.noarch",
"7Server-RH7-RHOS-5.0:openstack-utils-0:2014.2-1.el7ost.src",
"7Server-RH7-RHOS-5.0:python-novaclient-1:2.17.0-4.el7ost.noarch",
"7Server-RH7-RHOS-5.0:python-novaclient-1:2.17.0-4.el7ost.src",
"7Server-RH7-RHOS-5.0:python-novaclient-doc-1:2.17.0-4.el7ost.noarch",
"7Server-RH7-RHOS-5.0:python-requests-0:2.3.0-3.el7ost.noarch",
"7Server-RH7-RHOS-5.0:python-requests-0:2.3.0-3.el7ost.src",
"7Server-RH7-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el7ost.src",
"7Server-RH7-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:python-sqlalchemy-debuginfo-0:0.8.4-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:python-urllib3-0:1.8.2-5.el7ost.noarch",
"7Server-RH7-RHOS-5.0:python-urllib3-0:1.8.2-5.el7ost.src",
"7Server-RH7-RHOS-5.0:rabbitmq-server-0:3.3.5-3.el7ost.noarch",
"7Server-RH7-RHOS-5.0:rabbitmq-server-0:3.3.5-3.el7ost.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: unspecified vulnerability related to Server:Replication (CPU Jan 2015)"
},
{
"cve": "CVE-2015-0382",
"discovery_date": "2015-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1184555"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote attackers to affect availability via unknown vectors related to Server : Replication, a different vulnerability than CVE-2015-0381.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: unspecified vulnerability related to Server:Replication (CPU Jan 2015)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOS-5.0:mariadb-galera-1:5.5.41-2.el7ost.src",
"7Server-RH7-RHOS-5.0:mariadb-galera-common-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:mariadb-galera-debuginfo-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:mariadb-galera-server-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:openstack-sahara-0:2014.1.3-3.el7ost.noarch",
"7Server-RH7-RHOS-5.0:openstack-sahara-0:2014.1.3-3.el7ost.src",
"7Server-RH7-RHOS-5.0:openstack-sahara-doc-0:2014.1.3-3.el7ost.noarch",
"7Server-RH7-RHOS-5.0:openstack-selinux-0:0.6.25-1.el7ost.noarch",
"7Server-RH7-RHOS-5.0:openstack-selinux-0:0.6.25-1.el7ost.src",
"7Server-RH7-RHOS-5.0:openstack-utils-0:2014.2-1.el7ost.noarch",
"7Server-RH7-RHOS-5.0:openstack-utils-0:2014.2-1.el7ost.src",
"7Server-RH7-RHOS-5.0:python-novaclient-1:2.17.0-4.el7ost.noarch",
"7Server-RH7-RHOS-5.0:python-novaclient-1:2.17.0-4.el7ost.src",
"7Server-RH7-RHOS-5.0:python-novaclient-doc-1:2.17.0-4.el7ost.noarch",
"7Server-RH7-RHOS-5.0:python-requests-0:2.3.0-3.el7ost.noarch",
"7Server-RH7-RHOS-5.0:python-requests-0:2.3.0-3.el7ost.src",
"7Server-RH7-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el7ost.src",
"7Server-RH7-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:python-sqlalchemy-debuginfo-0:0.8.4-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:python-urllib3-0:1.8.2-5.el7ost.noarch",
"7Server-RH7-RHOS-5.0:python-urllib3-0:1.8.2-5.el7ost.src",
"7Server-RH7-RHOS-5.0:rabbitmq-server-0:3.3.5-3.el7ost.noarch",
"7Server-RH7-RHOS-5.0:rabbitmq-server-0:3.3.5-3.el7ost.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2015-0382"
},
{
"category": "external",
"summary": "RHBZ#1184555",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184555"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2015-0382",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0382"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-0382",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0382"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html#AppendixMSQL",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html#AppendixMSQL"
}
],
"release_date": "2015-01-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2015-04-16T14:28:14+00:00",
"details": "Before applying this update, ensure all previously released errata relevant\nto your system have been applied.\n\nRed Hat Enterprise Linux OpenStack Platform 5 for RHEL 7 runs on Red Hat\nEnterprise Linux 7.1.\n\nThe Red Hat Enterprise Linux OpenStack Platform 5 for RHEL 7 Release Notes\n(see References section) contain the following:\n* An explanation of the way in which the provided components interact to\nform a working cloud computing environment.\n* Technology Previews, Recommended Practices, and Known Issues.\n* The channels required for Red Hat Enterprise Linux OpenStack Platform 5\nfor RHEL 7, including which channels need to be enabled and disabled.\n\nFor details on how to apply this update, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RH7-RHOS-5.0:mariadb-galera-1:5.5.41-2.el7ost.src",
"7Server-RH7-RHOS-5.0:mariadb-galera-common-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:mariadb-galera-debuginfo-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:mariadb-galera-server-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:openstack-sahara-0:2014.1.3-3.el7ost.noarch",
"7Server-RH7-RHOS-5.0:openstack-sahara-0:2014.1.3-3.el7ost.src",
"7Server-RH7-RHOS-5.0:openstack-sahara-doc-0:2014.1.3-3.el7ost.noarch",
"7Server-RH7-RHOS-5.0:openstack-selinux-0:0.6.25-1.el7ost.noarch",
"7Server-RH7-RHOS-5.0:openstack-selinux-0:0.6.25-1.el7ost.src",
"7Server-RH7-RHOS-5.0:openstack-utils-0:2014.2-1.el7ost.noarch",
"7Server-RH7-RHOS-5.0:openstack-utils-0:2014.2-1.el7ost.src",
"7Server-RH7-RHOS-5.0:python-novaclient-1:2.17.0-4.el7ost.noarch",
"7Server-RH7-RHOS-5.0:python-novaclient-1:2.17.0-4.el7ost.src",
"7Server-RH7-RHOS-5.0:python-novaclient-doc-1:2.17.0-4.el7ost.noarch",
"7Server-RH7-RHOS-5.0:python-requests-0:2.3.0-3.el7ost.noarch",
"7Server-RH7-RHOS-5.0:python-requests-0:2.3.0-3.el7ost.src",
"7Server-RH7-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el7ost.src",
"7Server-RH7-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:python-sqlalchemy-debuginfo-0:0.8.4-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:python-urllib3-0:1.8.2-5.el7ost.noarch",
"7Server-RH7-RHOS-5.0:python-urllib3-0:1.8.2-5.el7ost.src",
"7Server-RH7-RHOS-5.0:rabbitmq-server-0:3.3.5-3.el7ost.noarch",
"7Server-RH7-RHOS-5.0:rabbitmq-server-0:3.3.5-3.el7ost.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2015:0825"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"7Server-RH7-RHOS-5.0:mariadb-galera-1:5.5.41-2.el7ost.src",
"7Server-RH7-RHOS-5.0:mariadb-galera-common-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:mariadb-galera-debuginfo-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:mariadb-galera-server-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:openstack-sahara-0:2014.1.3-3.el7ost.noarch",
"7Server-RH7-RHOS-5.0:openstack-sahara-0:2014.1.3-3.el7ost.src",
"7Server-RH7-RHOS-5.0:openstack-sahara-doc-0:2014.1.3-3.el7ost.noarch",
"7Server-RH7-RHOS-5.0:openstack-selinux-0:0.6.25-1.el7ost.noarch",
"7Server-RH7-RHOS-5.0:openstack-selinux-0:0.6.25-1.el7ost.src",
"7Server-RH7-RHOS-5.0:openstack-utils-0:2014.2-1.el7ost.noarch",
"7Server-RH7-RHOS-5.0:openstack-utils-0:2014.2-1.el7ost.src",
"7Server-RH7-RHOS-5.0:python-novaclient-1:2.17.0-4.el7ost.noarch",
"7Server-RH7-RHOS-5.0:python-novaclient-1:2.17.0-4.el7ost.src",
"7Server-RH7-RHOS-5.0:python-novaclient-doc-1:2.17.0-4.el7ost.noarch",
"7Server-RH7-RHOS-5.0:python-requests-0:2.3.0-3.el7ost.noarch",
"7Server-RH7-RHOS-5.0:python-requests-0:2.3.0-3.el7ost.src",
"7Server-RH7-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el7ost.src",
"7Server-RH7-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:python-sqlalchemy-debuginfo-0:0.8.4-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:python-urllib3-0:1.8.2-5.el7ost.noarch",
"7Server-RH7-RHOS-5.0:python-urllib3-0:1.8.2-5.el7ost.src",
"7Server-RH7-RHOS-5.0:rabbitmq-server-0:3.3.5-3.el7ost.noarch",
"7Server-RH7-RHOS-5.0:rabbitmq-server-0:3.3.5-3.el7ost.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: unspecified vulnerability related to Server:Replication (CPU Jan 2015)"
},
{
"cve": "CVE-2015-0411",
"discovery_date": "2015-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1184560"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier, and 5.6.21 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Server : Security : Encryption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: unspecified vulnerability related to Server:Security:Encryption (CPU Jan 2015)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOS-5.0:mariadb-galera-1:5.5.41-2.el7ost.src",
"7Server-RH7-RHOS-5.0:mariadb-galera-common-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:mariadb-galera-debuginfo-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:mariadb-galera-server-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:openstack-sahara-0:2014.1.3-3.el7ost.noarch",
"7Server-RH7-RHOS-5.0:openstack-sahara-0:2014.1.3-3.el7ost.src",
"7Server-RH7-RHOS-5.0:openstack-sahara-doc-0:2014.1.3-3.el7ost.noarch",
"7Server-RH7-RHOS-5.0:openstack-selinux-0:0.6.25-1.el7ost.noarch",
"7Server-RH7-RHOS-5.0:openstack-selinux-0:0.6.25-1.el7ost.src",
"7Server-RH7-RHOS-5.0:openstack-utils-0:2014.2-1.el7ost.noarch",
"7Server-RH7-RHOS-5.0:openstack-utils-0:2014.2-1.el7ost.src",
"7Server-RH7-RHOS-5.0:python-novaclient-1:2.17.0-4.el7ost.noarch",
"7Server-RH7-RHOS-5.0:python-novaclient-1:2.17.0-4.el7ost.src",
"7Server-RH7-RHOS-5.0:python-novaclient-doc-1:2.17.0-4.el7ost.noarch",
"7Server-RH7-RHOS-5.0:python-requests-0:2.3.0-3.el7ost.noarch",
"7Server-RH7-RHOS-5.0:python-requests-0:2.3.0-3.el7ost.src",
"7Server-RH7-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el7ost.src",
"7Server-RH7-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:python-sqlalchemy-debuginfo-0:0.8.4-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:python-urllib3-0:1.8.2-5.el7ost.noarch",
"7Server-RH7-RHOS-5.0:python-urllib3-0:1.8.2-5.el7ost.src",
"7Server-RH7-RHOS-5.0:rabbitmq-server-0:3.3.5-3.el7ost.noarch",
"7Server-RH7-RHOS-5.0:rabbitmq-server-0:3.3.5-3.el7ost.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2015-0411"
},
{
"category": "external",
"summary": "RHBZ#1184560",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184560"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2015-0411",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0411"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-0411",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0411"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html#AppendixMSQL",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html#AppendixMSQL"
}
],
"release_date": "2015-01-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2015-04-16T14:28:14+00:00",
"details": "Before applying this update, ensure all previously released errata relevant\nto your system have been applied.\n\nRed Hat Enterprise Linux OpenStack Platform 5 for RHEL 7 runs on Red Hat\nEnterprise Linux 7.1.\n\nThe Red Hat Enterprise Linux OpenStack Platform 5 for RHEL 7 Release Notes\n(see References section) contain the following:\n* An explanation of the way in which the provided components interact to\nform a working cloud computing environment.\n* Technology Previews, Recommended Practices, and Known Issues.\n* The channels required for Red Hat Enterprise Linux OpenStack Platform 5\nfor RHEL 7, including which channels need to be enabled and disabled.\n\nFor details on how to apply this update, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RH7-RHOS-5.0:mariadb-galera-1:5.5.41-2.el7ost.src",
"7Server-RH7-RHOS-5.0:mariadb-galera-common-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:mariadb-galera-debuginfo-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:mariadb-galera-server-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:openstack-sahara-0:2014.1.3-3.el7ost.noarch",
"7Server-RH7-RHOS-5.0:openstack-sahara-0:2014.1.3-3.el7ost.src",
"7Server-RH7-RHOS-5.0:openstack-sahara-doc-0:2014.1.3-3.el7ost.noarch",
"7Server-RH7-RHOS-5.0:openstack-selinux-0:0.6.25-1.el7ost.noarch",
"7Server-RH7-RHOS-5.0:openstack-selinux-0:0.6.25-1.el7ost.src",
"7Server-RH7-RHOS-5.0:openstack-utils-0:2014.2-1.el7ost.noarch",
"7Server-RH7-RHOS-5.0:openstack-utils-0:2014.2-1.el7ost.src",
"7Server-RH7-RHOS-5.0:python-novaclient-1:2.17.0-4.el7ost.noarch",
"7Server-RH7-RHOS-5.0:python-novaclient-1:2.17.0-4.el7ost.src",
"7Server-RH7-RHOS-5.0:python-novaclient-doc-1:2.17.0-4.el7ost.noarch",
"7Server-RH7-RHOS-5.0:python-requests-0:2.3.0-3.el7ost.noarch",
"7Server-RH7-RHOS-5.0:python-requests-0:2.3.0-3.el7ost.src",
"7Server-RH7-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el7ost.src",
"7Server-RH7-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:python-sqlalchemy-debuginfo-0:0.8.4-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:python-urllib3-0:1.8.2-5.el7ost.noarch",
"7Server-RH7-RHOS-5.0:python-urllib3-0:1.8.2-5.el7ost.src",
"7Server-RH7-RHOS-5.0:rabbitmq-server-0:3.3.5-3.el7ost.noarch",
"7Server-RH7-RHOS-5.0:rabbitmq-server-0:3.3.5-3.el7ost.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2015:0825"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"7Server-RH7-RHOS-5.0:mariadb-galera-1:5.5.41-2.el7ost.src",
"7Server-RH7-RHOS-5.0:mariadb-galera-common-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:mariadb-galera-debuginfo-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:mariadb-galera-server-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:openstack-sahara-0:2014.1.3-3.el7ost.noarch",
"7Server-RH7-RHOS-5.0:openstack-sahara-0:2014.1.3-3.el7ost.src",
"7Server-RH7-RHOS-5.0:openstack-sahara-doc-0:2014.1.3-3.el7ost.noarch",
"7Server-RH7-RHOS-5.0:openstack-selinux-0:0.6.25-1.el7ost.noarch",
"7Server-RH7-RHOS-5.0:openstack-selinux-0:0.6.25-1.el7ost.src",
"7Server-RH7-RHOS-5.0:openstack-utils-0:2014.2-1.el7ost.noarch",
"7Server-RH7-RHOS-5.0:openstack-utils-0:2014.2-1.el7ost.src",
"7Server-RH7-RHOS-5.0:python-novaclient-1:2.17.0-4.el7ost.noarch",
"7Server-RH7-RHOS-5.0:python-novaclient-1:2.17.0-4.el7ost.src",
"7Server-RH7-RHOS-5.0:python-novaclient-doc-1:2.17.0-4.el7ost.noarch",
"7Server-RH7-RHOS-5.0:python-requests-0:2.3.0-3.el7ost.noarch",
"7Server-RH7-RHOS-5.0:python-requests-0:2.3.0-3.el7ost.src",
"7Server-RH7-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el7ost.src",
"7Server-RH7-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:python-sqlalchemy-debuginfo-0:0.8.4-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:python-urllib3-0:1.8.2-5.el7ost.noarch",
"7Server-RH7-RHOS-5.0:python-urllib3-0:1.8.2-5.el7ost.src",
"7Server-RH7-RHOS-5.0:rabbitmq-server-0:3.3.5-3.el7ost.noarch",
"7Server-RH7-RHOS-5.0:rabbitmq-server-0:3.3.5-3.el7ost.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: unspecified vulnerability related to Server:Security:Encryption (CPU Jan 2015)"
},
{
"cve": "CVE-2015-0432",
"discovery_date": "2015-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1184561"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier allows remote authenticated users to affect availability via vectors related to Server : InnoDB : DDL : Foreign Key.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: unspecified vulnerability related to Server:InnoDB:DDL:Foreign Key (CPU Jan 2015)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOS-5.0:mariadb-galera-1:5.5.41-2.el7ost.src",
"7Server-RH7-RHOS-5.0:mariadb-galera-common-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:mariadb-galera-debuginfo-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:mariadb-galera-server-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:openstack-sahara-0:2014.1.3-3.el7ost.noarch",
"7Server-RH7-RHOS-5.0:openstack-sahara-0:2014.1.3-3.el7ost.src",
"7Server-RH7-RHOS-5.0:openstack-sahara-doc-0:2014.1.3-3.el7ost.noarch",
"7Server-RH7-RHOS-5.0:openstack-selinux-0:0.6.25-1.el7ost.noarch",
"7Server-RH7-RHOS-5.0:openstack-selinux-0:0.6.25-1.el7ost.src",
"7Server-RH7-RHOS-5.0:openstack-utils-0:2014.2-1.el7ost.noarch",
"7Server-RH7-RHOS-5.0:openstack-utils-0:2014.2-1.el7ost.src",
"7Server-RH7-RHOS-5.0:python-novaclient-1:2.17.0-4.el7ost.noarch",
"7Server-RH7-RHOS-5.0:python-novaclient-1:2.17.0-4.el7ost.src",
"7Server-RH7-RHOS-5.0:python-novaclient-doc-1:2.17.0-4.el7ost.noarch",
"7Server-RH7-RHOS-5.0:python-requests-0:2.3.0-3.el7ost.noarch",
"7Server-RH7-RHOS-5.0:python-requests-0:2.3.0-3.el7ost.src",
"7Server-RH7-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el7ost.src",
"7Server-RH7-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:python-sqlalchemy-debuginfo-0:0.8.4-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:python-urllib3-0:1.8.2-5.el7ost.noarch",
"7Server-RH7-RHOS-5.0:python-urllib3-0:1.8.2-5.el7ost.src",
"7Server-RH7-RHOS-5.0:rabbitmq-server-0:3.3.5-3.el7ost.noarch",
"7Server-RH7-RHOS-5.0:rabbitmq-server-0:3.3.5-3.el7ost.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2015-0432"
},
{
"category": "external",
"summary": "RHBZ#1184561",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184561"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2015-0432",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0432"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-0432",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0432"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html#AppendixMSQL",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html#AppendixMSQL"
}
],
"release_date": "2015-01-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2015-04-16T14:28:14+00:00",
"details": "Before applying this update, ensure all previously released errata relevant\nto your system have been applied.\n\nRed Hat Enterprise Linux OpenStack Platform 5 for RHEL 7 runs on Red Hat\nEnterprise Linux 7.1.\n\nThe Red Hat Enterprise Linux OpenStack Platform 5 for RHEL 7 Release Notes\n(see References section) contain the following:\n* An explanation of the way in which the provided components interact to\nform a working cloud computing environment.\n* Technology Previews, Recommended Practices, and Known Issues.\n* The channels required for Red Hat Enterprise Linux OpenStack Platform 5\nfor RHEL 7, including which channels need to be enabled and disabled.\n\nFor details on how to apply this update, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RH7-RHOS-5.0:mariadb-galera-1:5.5.41-2.el7ost.src",
"7Server-RH7-RHOS-5.0:mariadb-galera-common-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:mariadb-galera-debuginfo-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:mariadb-galera-server-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:openstack-sahara-0:2014.1.3-3.el7ost.noarch",
"7Server-RH7-RHOS-5.0:openstack-sahara-0:2014.1.3-3.el7ost.src",
"7Server-RH7-RHOS-5.0:openstack-sahara-doc-0:2014.1.3-3.el7ost.noarch",
"7Server-RH7-RHOS-5.0:openstack-selinux-0:0.6.25-1.el7ost.noarch",
"7Server-RH7-RHOS-5.0:openstack-selinux-0:0.6.25-1.el7ost.src",
"7Server-RH7-RHOS-5.0:openstack-utils-0:2014.2-1.el7ost.noarch",
"7Server-RH7-RHOS-5.0:openstack-utils-0:2014.2-1.el7ost.src",
"7Server-RH7-RHOS-5.0:python-novaclient-1:2.17.0-4.el7ost.noarch",
"7Server-RH7-RHOS-5.0:python-novaclient-1:2.17.0-4.el7ost.src",
"7Server-RH7-RHOS-5.0:python-novaclient-doc-1:2.17.0-4.el7ost.noarch",
"7Server-RH7-RHOS-5.0:python-requests-0:2.3.0-3.el7ost.noarch",
"7Server-RH7-RHOS-5.0:python-requests-0:2.3.0-3.el7ost.src",
"7Server-RH7-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el7ost.src",
"7Server-RH7-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:python-sqlalchemy-debuginfo-0:0.8.4-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:python-urllib3-0:1.8.2-5.el7ost.noarch",
"7Server-RH7-RHOS-5.0:python-urllib3-0:1.8.2-5.el7ost.src",
"7Server-RH7-RHOS-5.0:rabbitmq-server-0:3.3.5-3.el7ost.noarch",
"7Server-RH7-RHOS-5.0:rabbitmq-server-0:3.3.5-3.el7ost.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2015:0825"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"7Server-RH7-RHOS-5.0:mariadb-galera-1:5.5.41-2.el7ost.src",
"7Server-RH7-RHOS-5.0:mariadb-galera-common-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:mariadb-galera-debuginfo-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:mariadb-galera-server-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:openstack-sahara-0:2014.1.3-3.el7ost.noarch",
"7Server-RH7-RHOS-5.0:openstack-sahara-0:2014.1.3-3.el7ost.src",
"7Server-RH7-RHOS-5.0:openstack-sahara-doc-0:2014.1.3-3.el7ost.noarch",
"7Server-RH7-RHOS-5.0:openstack-selinux-0:0.6.25-1.el7ost.noarch",
"7Server-RH7-RHOS-5.0:openstack-selinux-0:0.6.25-1.el7ost.src",
"7Server-RH7-RHOS-5.0:openstack-utils-0:2014.2-1.el7ost.noarch",
"7Server-RH7-RHOS-5.0:openstack-utils-0:2014.2-1.el7ost.src",
"7Server-RH7-RHOS-5.0:python-novaclient-1:2.17.0-4.el7ost.noarch",
"7Server-RH7-RHOS-5.0:python-novaclient-1:2.17.0-4.el7ost.src",
"7Server-RH7-RHOS-5.0:python-novaclient-doc-1:2.17.0-4.el7ost.noarch",
"7Server-RH7-RHOS-5.0:python-requests-0:2.3.0-3.el7ost.noarch",
"7Server-RH7-RHOS-5.0:python-requests-0:2.3.0-3.el7ost.src",
"7Server-RH7-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el7ost.src",
"7Server-RH7-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:python-sqlalchemy-debuginfo-0:0.8.4-2.el7ost.x86_64",
"7Server-RH7-RHOS-5.0:python-urllib3-0:1.8.2-5.el7ost.noarch",
"7Server-RH7-RHOS-5.0:python-urllib3-0:1.8.2-5.el7ost.src",
"7Server-RH7-RHOS-5.0:rabbitmq-server-0:3.3.5-3.el7ost.noarch",
"7Server-RH7-RHOS-5.0:rabbitmq-server-0:3.3.5-3.el7ost.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: unspecified vulnerability related to Server:InnoDB:DDL:Foreign Key (CPU Jan 2015)"
}
]
}
RHBA-2015:0928
Vulnerability from csaf_redhat - Published: 2015-05-05 13:30 - Updated: 2026-01-13 21:13Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier, and 5.6.21 and earlier, allows remote authenticated users to affect availability via vectors related to Server : InnoDB : DML.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 7Server-RH7-RHOS-6.0:diskimage-builder-0:0.1.34-21.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:diskimage-builder-0:0.1.34-21.el7ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:mariadb-galera-1:5.5.41-2.el7ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:mariadb-galera-common-1:5.5.41-2.el7ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:mariadb-galera-debuginfo-1:5.5.41-2.el7ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:mariadb-galera-server-1:5.5.41-2.el7ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:openstack-selinux-0:0.6.29-1.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:openstack-selinux-0:0.6.29-1.el7ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:openstack-trove-0:2014.2.3-3.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:openstack-trove-0:2014.2.3-3.el7ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:openstack-trove-api-0:2014.2.3-3.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:openstack-trove-common-0:2014.2.3-3.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:openstack-trove-conductor-0:2014.2.3-3.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:openstack-trove-guestagent-0:2014.2.3-3.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:openstack-trove-taskmanager-0:2014.2.3-3.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:python-trove-0:2014.2.3-3.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:redhat-access-plugin-openstack-0:6.0.3-1.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:redhat-access-plugin-openstack-0:6.0.3-1.el7ost.src | — |
Vendor Fix
fix
|
Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote authenticated users to affect confidentiality via unknown vectors related to Server : Security : Privileges : Foreign Key.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 7Server-RH7-RHOS-6.0:diskimage-builder-0:0.1.34-21.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:diskimage-builder-0:0.1.34-21.el7ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:mariadb-galera-1:5.5.41-2.el7ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:mariadb-galera-common-1:5.5.41-2.el7ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:mariadb-galera-debuginfo-1:5.5.41-2.el7ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:mariadb-galera-server-1:5.5.41-2.el7ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:openstack-selinux-0:0.6.29-1.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:openstack-selinux-0:0.6.29-1.el7ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:openstack-trove-0:2014.2.3-3.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:openstack-trove-0:2014.2.3-3.el7ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:openstack-trove-api-0:2014.2.3-3.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:openstack-trove-common-0:2014.2.3-3.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:openstack-trove-conductor-0:2014.2.3-3.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:openstack-trove-guestagent-0:2014.2.3-3.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:openstack-trove-taskmanager-0:2014.2.3-3.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:python-trove-0:2014.2.3-3.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:redhat-access-plugin-openstack-0:6.0.3-1.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:redhat-access-plugin-openstack-0:6.0.3-1.el7ost.src | — |
Vendor Fix
fix
|
Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote attackers to affect availability via unknown vectors related to Server : Replication, a different vulnerability than CVE-2015-0382.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 7Server-RH7-RHOS-6.0:diskimage-builder-0:0.1.34-21.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:diskimage-builder-0:0.1.34-21.el7ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:mariadb-galera-1:5.5.41-2.el7ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:mariadb-galera-common-1:5.5.41-2.el7ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:mariadb-galera-debuginfo-1:5.5.41-2.el7ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:mariadb-galera-server-1:5.5.41-2.el7ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:openstack-selinux-0:0.6.29-1.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:openstack-selinux-0:0.6.29-1.el7ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:openstack-trove-0:2014.2.3-3.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:openstack-trove-0:2014.2.3-3.el7ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:openstack-trove-api-0:2014.2.3-3.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:openstack-trove-common-0:2014.2.3-3.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:openstack-trove-conductor-0:2014.2.3-3.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:openstack-trove-guestagent-0:2014.2.3-3.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:openstack-trove-taskmanager-0:2014.2.3-3.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:python-trove-0:2014.2.3-3.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:redhat-access-plugin-openstack-0:6.0.3-1.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:redhat-access-plugin-openstack-0:6.0.3-1.el7ost.src | — |
Vendor Fix
fix
|
Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote attackers to affect availability via unknown vectors related to Server : Replication, a different vulnerability than CVE-2015-0381.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 7Server-RH7-RHOS-6.0:diskimage-builder-0:0.1.34-21.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:diskimage-builder-0:0.1.34-21.el7ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:mariadb-galera-1:5.5.41-2.el7ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:mariadb-galera-common-1:5.5.41-2.el7ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:mariadb-galera-debuginfo-1:5.5.41-2.el7ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:mariadb-galera-server-1:5.5.41-2.el7ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:openstack-selinux-0:0.6.29-1.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:openstack-selinux-0:0.6.29-1.el7ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:openstack-trove-0:2014.2.3-3.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:openstack-trove-0:2014.2.3-3.el7ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:openstack-trove-api-0:2014.2.3-3.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:openstack-trove-common-0:2014.2.3-3.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:openstack-trove-conductor-0:2014.2.3-3.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:openstack-trove-guestagent-0:2014.2.3-3.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:openstack-trove-taskmanager-0:2014.2.3-3.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:python-trove-0:2014.2.3-3.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:redhat-access-plugin-openstack-0:6.0.3-1.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:redhat-access-plugin-openstack-0:6.0.3-1.el7ost.src | — |
Vendor Fix
fix
|
Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier, and 5.6.21 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Server : Security : Encryption.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 7Server-RH7-RHOS-6.0:diskimage-builder-0:0.1.34-21.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:diskimage-builder-0:0.1.34-21.el7ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:mariadb-galera-1:5.5.41-2.el7ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:mariadb-galera-common-1:5.5.41-2.el7ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:mariadb-galera-debuginfo-1:5.5.41-2.el7ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:mariadb-galera-server-1:5.5.41-2.el7ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:openstack-selinux-0:0.6.29-1.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:openstack-selinux-0:0.6.29-1.el7ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:openstack-trove-0:2014.2.3-3.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:openstack-trove-0:2014.2.3-3.el7ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:openstack-trove-api-0:2014.2.3-3.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:openstack-trove-common-0:2014.2.3-3.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:openstack-trove-conductor-0:2014.2.3-3.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:openstack-trove-guestagent-0:2014.2.3-3.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:openstack-trove-taskmanager-0:2014.2.3-3.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:python-trove-0:2014.2.3-3.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:redhat-access-plugin-openstack-0:6.0.3-1.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:redhat-access-plugin-openstack-0:6.0.3-1.el7ost.src | — |
Vendor Fix
fix
|
Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier allows remote authenticated users to affect availability via vectors related to Server : InnoDB : DDL : Foreign Key.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 7Server-RH7-RHOS-6.0:diskimage-builder-0:0.1.34-21.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:diskimage-builder-0:0.1.34-21.el7ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:mariadb-galera-1:5.5.41-2.el7ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:mariadb-galera-common-1:5.5.41-2.el7ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:mariadb-galera-debuginfo-1:5.5.41-2.el7ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:mariadb-galera-server-1:5.5.41-2.el7ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:openstack-selinux-0:0.6.29-1.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:openstack-selinux-0:0.6.29-1.el7ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:openstack-trove-0:2014.2.3-3.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:openstack-trove-0:2014.2.3-3.el7ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:openstack-trove-api-0:2014.2.3-3.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:openstack-trove-common-0:2014.2.3-3.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:openstack-trove-conductor-0:2014.2.3-3.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:openstack-trove-guestagent-0:2014.2.3-3.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:openstack-trove-taskmanager-0:2014.2.3-3.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:python-trove-0:2014.2.3-3.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:redhat-access-plugin-openstack-0:6.0.3-1.el7ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 7Server-RH7-RHOS-6.0:redhat-access-plugin-openstack-0:6.0.3-1.el7ost.src | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated packages that resolve various issues are now available for Red Hat\nEnterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Enterprise Linux OpenStack Platform provides the facilities for\nbuilding a private or public infrastructure-as-a-service (IaaS) cloud\nrunning on commonly available physical hardware.\n\nThis update addresses the following issues:\n\nThis rebase package includes a notable fix under version 5.5.41:\n* With this release, mariadb-galera is rebased to version 5.5.41, fixing the memory barrier problem in InnoDB/XtraDB mutex implementation, which caused the server to stall or hang. (BZ#1203009)\n\n* Prior to this update, freeform options could not be passed to MKFS from DIB, even though the FS type was modifiable.\nConsequently, when building an ext4 FS on Red Hat Enterprise Linux (RHEL) 6 from a RHEL 7 build host, the 64-bit flag was set, resulting in a non-booting VM.\nThis fix addresses this issue by adding the mkfs-options arg to the disk-image-create script, allowing arbitrary user-defined options to be passed to mkfs.\nAs a result, fully booting ext4 FS can be built on RHEL 6 from RHEL 7, and as a side benefit, users now have a hook to specify many properties of their filesystem which were previously locked without code modification. (BZ#1206676)\n\n* Prior to this update, the openstack-trove-guestagent service may have failed to start if the underlying database was not running. This update ensures that the MariaDB service is running before starting the guestagent. The workaround is to first start the guestagent service. (BZ#1209584)\n\n* Previously, SELinux blocked Compute from spawning an instance when using live migration with NFS storage. \nConsequently, Compute was prevented from creating instances.\nThis update allows virt types to write to Compute file types, and as a result, Compute is now able to spawn an instance. (BZ#1211628)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHBA-2015:0928",
"url": "https://access.redhat.com/errata/RHBA-2015:0928"
},
{
"category": "external",
"summary": "https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux_OpenStack_Platform/6/html/Release_Notes/index.html",
"url": "https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux_OpenStack_Platform/6/html/Release_Notes/index.html"
},
{
"category": "external",
"summary": "1024556",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1024556"
},
{
"category": "external",
"summary": "1203009",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203009"
},
{
"category": "external",
"summary": "1206676",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206676"
},
{
"category": "external",
"summary": "1209584",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1209584"
},
{
"category": "external",
"summary": "1210463",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1210463"
},
{
"category": "external",
"summary": "1212893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212893"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhba-2015_0928.json"
}
],
"title": "Red Hat Bug Fix Advisory: Red Hat Enterprise Linux OpenStack Platform Bug Fix and Enhancement Advisory",
"tracking": {
"current_release_date": "2026-01-13T21:13:50+00:00",
"generator": {
"date": "2026-01-13T21:13:50+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.15"
}
},
"id": "RHBA-2015:0928",
"initial_release_date": "2015-05-05T13:30:45+00:00",
"revision_history": [
{
"date": "2015-05-05T13:30:45+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2015-05-05T13:30:45+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-13T21:13:50+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7",
"product": {
"name": "Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7",
"product_id": "7Server-RH7-RHOS-6.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openstack:6::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenStack Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "diskimage-builder-0:0.1.34-21.el7ost.src",
"product": {
"name": "diskimage-builder-0:0.1.34-21.el7ost.src",
"product_id": "diskimage-builder-0:0.1.34-21.el7ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/diskimage-builder@0.1.34-21.el7ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "openstack-selinux-0:0.6.29-1.el7ost.src",
"product": {
"name": "openstack-selinux-0:0.6.29-1.el7ost.src",
"product_id": "openstack-selinux-0:0.6.29-1.el7ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-selinux@0.6.29-1.el7ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "redhat-access-plugin-openstack-0:6.0.3-1.el7ost.src",
"product": {
"name": "redhat-access-plugin-openstack-0:6.0.3-1.el7ost.src",
"product_id": "redhat-access-plugin-openstack-0:6.0.3-1.el7ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-access-plugin-openstack@6.0.3-1.el7ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "mariadb-galera-1:5.5.41-2.el7ost.src",
"product": {
"name": "mariadb-galera-1:5.5.41-2.el7ost.src",
"product_id": "mariadb-galera-1:5.5.41-2.el7ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mariadb-galera@5.5.41-2.el7ost?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openstack-trove-0:2014.2.3-3.el7ost.src",
"product": {
"name": "openstack-trove-0:2014.2.3-3.el7ost.src",
"product_id": "openstack-trove-0:2014.2.3-3.el7ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-trove@2014.2.3-3.el7ost?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "diskimage-builder-0:0.1.34-21.el7ost.noarch",
"product": {
"name": "diskimage-builder-0:0.1.34-21.el7ost.noarch",
"product_id": "diskimage-builder-0:0.1.34-21.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/diskimage-builder@0.1.34-21.el7ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openstack-selinux-0:0.6.29-1.el7ost.noarch",
"product": {
"name": "openstack-selinux-0:0.6.29-1.el7ost.noarch",
"product_id": "openstack-selinux-0:0.6.29-1.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-selinux@0.6.29-1.el7ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "redhat-access-plugin-openstack-0:6.0.3-1.el7ost.noarch",
"product": {
"name": "redhat-access-plugin-openstack-0:6.0.3-1.el7ost.noarch",
"product_id": "redhat-access-plugin-openstack-0:6.0.3-1.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-access-plugin-openstack@6.0.3-1.el7ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openstack-trove-api-0:2014.2.3-3.el7ost.noarch",
"product": {
"name": "openstack-trove-api-0:2014.2.3-3.el7ost.noarch",
"product_id": "openstack-trove-api-0:2014.2.3-3.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-trove-api@2014.2.3-3.el7ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openstack-trove-taskmanager-0:2014.2.3-3.el7ost.noarch",
"product": {
"name": "openstack-trove-taskmanager-0:2014.2.3-3.el7ost.noarch",
"product_id": "openstack-trove-taskmanager-0:2014.2.3-3.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-trove-taskmanager@2014.2.3-3.el7ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openstack-trove-0:2014.2.3-3.el7ost.noarch",
"product": {
"name": "openstack-trove-0:2014.2.3-3.el7ost.noarch",
"product_id": "openstack-trove-0:2014.2.3-3.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-trove@2014.2.3-3.el7ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openstack-trove-guestagent-0:2014.2.3-3.el7ost.noarch",
"product": {
"name": "openstack-trove-guestagent-0:2014.2.3-3.el7ost.noarch",
"product_id": "openstack-trove-guestagent-0:2014.2.3-3.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-trove-guestagent@2014.2.3-3.el7ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openstack-trove-common-0:2014.2.3-3.el7ost.noarch",
"product": {
"name": "openstack-trove-common-0:2014.2.3-3.el7ost.noarch",
"product_id": "openstack-trove-common-0:2014.2.3-3.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-trove-common@2014.2.3-3.el7ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python-trove-0:2014.2.3-3.el7ost.noarch",
"product": {
"name": "python-trove-0:2014.2.3-3.el7ost.noarch",
"product_id": "python-trove-0:2014.2.3-3.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-trove@2014.2.3-3.el7ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "openstack-trove-conductor-0:2014.2.3-3.el7ost.noarch",
"product": {
"name": "openstack-trove-conductor-0:2014.2.3-3.el7ost.noarch",
"product_id": "openstack-trove-conductor-0:2014.2.3-3.el7ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-trove-conductor@2014.2.3-3.el7ost?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "mariadb-galera-debuginfo-1:5.5.41-2.el7ost.x86_64",
"product": {
"name": "mariadb-galera-debuginfo-1:5.5.41-2.el7ost.x86_64",
"product_id": "mariadb-galera-debuginfo-1:5.5.41-2.el7ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mariadb-galera-debuginfo@5.5.41-2.el7ost?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mariadb-galera-common-1:5.5.41-2.el7ost.x86_64",
"product": {
"name": "mariadb-galera-common-1:5.5.41-2.el7ost.x86_64",
"product_id": "mariadb-galera-common-1:5.5.41-2.el7ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mariadb-galera-common@5.5.41-2.el7ost?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "mariadb-galera-server-1:5.5.41-2.el7ost.x86_64",
"product": {
"name": "mariadb-galera-server-1:5.5.41-2.el7ost.x86_64",
"product_id": "mariadb-galera-server-1:5.5.41-2.el7ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mariadb-galera-server@5.5.41-2.el7ost?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "diskimage-builder-0:0.1.34-21.el7ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7",
"product_id": "7Server-RH7-RHOS-6.0:diskimage-builder-0:0.1.34-21.el7ost.noarch"
},
"product_reference": "diskimage-builder-0:0.1.34-21.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "diskimage-builder-0:0.1.34-21.el7ost.src as a component of Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7",
"product_id": "7Server-RH7-RHOS-6.0:diskimage-builder-0:0.1.34-21.el7ost.src"
},
"product_reference": "diskimage-builder-0:0.1.34-21.el7ost.src",
"relates_to_product_reference": "7Server-RH7-RHOS-6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mariadb-galera-1:5.5.41-2.el7ost.src as a component of Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7",
"product_id": "7Server-RH7-RHOS-6.0:mariadb-galera-1:5.5.41-2.el7ost.src"
},
"product_reference": "mariadb-galera-1:5.5.41-2.el7ost.src",
"relates_to_product_reference": "7Server-RH7-RHOS-6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mariadb-galera-common-1:5.5.41-2.el7ost.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7",
"product_id": "7Server-RH7-RHOS-6.0:mariadb-galera-common-1:5.5.41-2.el7ost.x86_64"
},
"product_reference": "mariadb-galera-common-1:5.5.41-2.el7ost.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOS-6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mariadb-galera-debuginfo-1:5.5.41-2.el7ost.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7",
"product_id": "7Server-RH7-RHOS-6.0:mariadb-galera-debuginfo-1:5.5.41-2.el7ost.x86_64"
},
"product_reference": "mariadb-galera-debuginfo-1:5.5.41-2.el7ost.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOS-6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mariadb-galera-server-1:5.5.41-2.el7ost.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7",
"product_id": "7Server-RH7-RHOS-6.0:mariadb-galera-server-1:5.5.41-2.el7ost.x86_64"
},
"product_reference": "mariadb-galera-server-1:5.5.41-2.el7ost.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOS-6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-selinux-0:0.6.29-1.el7ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7",
"product_id": "7Server-RH7-RHOS-6.0:openstack-selinux-0:0.6.29-1.el7ost.noarch"
},
"product_reference": "openstack-selinux-0:0.6.29-1.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-selinux-0:0.6.29-1.el7ost.src as a component of Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7",
"product_id": "7Server-RH7-RHOS-6.0:openstack-selinux-0:0.6.29-1.el7ost.src"
},
"product_reference": "openstack-selinux-0:0.6.29-1.el7ost.src",
"relates_to_product_reference": "7Server-RH7-RHOS-6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-trove-0:2014.2.3-3.el7ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7",
"product_id": "7Server-RH7-RHOS-6.0:openstack-trove-0:2014.2.3-3.el7ost.noarch"
},
"product_reference": "openstack-trove-0:2014.2.3-3.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-trove-0:2014.2.3-3.el7ost.src as a component of Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7",
"product_id": "7Server-RH7-RHOS-6.0:openstack-trove-0:2014.2.3-3.el7ost.src"
},
"product_reference": "openstack-trove-0:2014.2.3-3.el7ost.src",
"relates_to_product_reference": "7Server-RH7-RHOS-6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-trove-api-0:2014.2.3-3.el7ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7",
"product_id": "7Server-RH7-RHOS-6.0:openstack-trove-api-0:2014.2.3-3.el7ost.noarch"
},
"product_reference": "openstack-trove-api-0:2014.2.3-3.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-trove-common-0:2014.2.3-3.el7ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7",
"product_id": "7Server-RH7-RHOS-6.0:openstack-trove-common-0:2014.2.3-3.el7ost.noarch"
},
"product_reference": "openstack-trove-common-0:2014.2.3-3.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-trove-conductor-0:2014.2.3-3.el7ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7",
"product_id": "7Server-RH7-RHOS-6.0:openstack-trove-conductor-0:2014.2.3-3.el7ost.noarch"
},
"product_reference": "openstack-trove-conductor-0:2014.2.3-3.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-trove-guestagent-0:2014.2.3-3.el7ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7",
"product_id": "7Server-RH7-RHOS-6.0:openstack-trove-guestagent-0:2014.2.3-3.el7ost.noarch"
},
"product_reference": "openstack-trove-guestagent-0:2014.2.3-3.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-trove-taskmanager-0:2014.2.3-3.el7ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7",
"product_id": "7Server-RH7-RHOS-6.0:openstack-trove-taskmanager-0:2014.2.3-3.el7ost.noarch"
},
"product_reference": "openstack-trove-taskmanager-0:2014.2.3-3.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-trove-0:2014.2.3-3.el7ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7",
"product_id": "7Server-RH7-RHOS-6.0:python-trove-0:2014.2.3-3.el7ost.noarch"
},
"product_reference": "python-trove-0:2014.2.3-3.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-access-plugin-openstack-0:6.0.3-1.el7ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7",
"product_id": "7Server-RH7-RHOS-6.0:redhat-access-plugin-openstack-0:6.0.3-1.el7ost.noarch"
},
"product_reference": "redhat-access-plugin-openstack-0:6.0.3-1.el7ost.noarch",
"relates_to_product_reference": "7Server-RH7-RHOS-6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-access-plugin-openstack-0:6.0.3-1.el7ost.src as a component of Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7",
"product_id": "7Server-RH7-RHOS-6.0:redhat-access-plugin-openstack-0:6.0.3-1.el7ost.src"
},
"product_reference": "redhat-access-plugin-openstack-0:6.0.3-1.el7ost.src",
"relates_to_product_reference": "7Server-RH7-RHOS-6.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2014-6568",
"discovery_date": "2015-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1184552"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier, and 5.6.21 and earlier, allows remote authenticated users to affect availability via vectors related to Server : InnoDB : DML.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: unspecified vulnerability related to Server:InnoDB:DML (CPU Jan 2015)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOS-6.0:diskimage-builder-0:0.1.34-21.el7ost.noarch",
"7Server-RH7-RHOS-6.0:diskimage-builder-0:0.1.34-21.el7ost.src",
"7Server-RH7-RHOS-6.0:mariadb-galera-1:5.5.41-2.el7ost.src",
"7Server-RH7-RHOS-6.0:mariadb-galera-common-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-6.0:mariadb-galera-debuginfo-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-6.0:mariadb-galera-server-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-6.0:openstack-selinux-0:0.6.29-1.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-selinux-0:0.6.29-1.el7ost.src",
"7Server-RH7-RHOS-6.0:openstack-trove-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-0:2014.2.3-3.el7ost.src",
"7Server-RH7-RHOS-6.0:openstack-trove-api-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-common-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-conductor-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-guestagent-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-taskmanager-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:python-trove-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:redhat-access-plugin-openstack-0:6.0.3-1.el7ost.noarch",
"7Server-RH7-RHOS-6.0:redhat-access-plugin-openstack-0:6.0.3-1.el7ost.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-6568"
},
{
"category": "external",
"summary": "RHBZ#1184552",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184552"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-6568",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6568"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-6568",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6568"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html#AppendixMSQL",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html#AppendixMSQL"
}
],
"release_date": "2015-01-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2015-05-05T13:30:45+00:00",
"details": "Before applying this update, ensure all previously released errata relevant to your system have been applied.\n\nRed Hat Enterprise Linux OpenStack Platform 6 runs on Red Hat Enterprise Linux 7.1.\n\nThis update is available through \u0027yum update\u0027 on systems registered through Red Hat Subscription Manager. For more information about Red Hat Subscription Manager, see:\nhttps://access.redhat.com/documentation/en-US/Red_Hat_Subscription_Management/1/html/RHSM/index.html\n\nRed Hat Enterprise Linux OpenStack Platform 6 documentation is available at:\nhttps://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux_OpenStack_Platform\n\nThe Red Hat Enterprise Linux OpenStack Platform 6 Release Notes (see the References section) contain the following:\n* Technology Previews, Recommended Practices, and Known Issues.\n* The channels required for Red Hat Enterprise Linux OpenStack Platform 6, including which channels need to be enabled and disabled.",
"product_ids": [
"7Server-RH7-RHOS-6.0:diskimage-builder-0:0.1.34-21.el7ost.noarch",
"7Server-RH7-RHOS-6.0:diskimage-builder-0:0.1.34-21.el7ost.src",
"7Server-RH7-RHOS-6.0:mariadb-galera-1:5.5.41-2.el7ost.src",
"7Server-RH7-RHOS-6.0:mariadb-galera-common-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-6.0:mariadb-galera-debuginfo-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-6.0:mariadb-galera-server-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-6.0:openstack-selinux-0:0.6.29-1.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-selinux-0:0.6.29-1.el7ost.src",
"7Server-RH7-RHOS-6.0:openstack-trove-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-0:2014.2.3-3.el7ost.src",
"7Server-RH7-RHOS-6.0:openstack-trove-api-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-common-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-conductor-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-guestagent-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-taskmanager-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:python-trove-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:redhat-access-plugin-openstack-0:6.0.3-1.el7ost.noarch",
"7Server-RH7-RHOS-6.0:redhat-access-plugin-openstack-0:6.0.3-1.el7ost.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2015:0928"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"7Server-RH7-RHOS-6.0:diskimage-builder-0:0.1.34-21.el7ost.noarch",
"7Server-RH7-RHOS-6.0:diskimage-builder-0:0.1.34-21.el7ost.src",
"7Server-RH7-RHOS-6.0:mariadb-galera-1:5.5.41-2.el7ost.src",
"7Server-RH7-RHOS-6.0:mariadb-galera-common-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-6.0:mariadb-galera-debuginfo-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-6.0:mariadb-galera-server-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-6.0:openstack-selinux-0:0.6.29-1.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-selinux-0:0.6.29-1.el7ost.src",
"7Server-RH7-RHOS-6.0:openstack-trove-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-0:2014.2.3-3.el7ost.src",
"7Server-RH7-RHOS-6.0:openstack-trove-api-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-common-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-conductor-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-guestagent-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-taskmanager-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:python-trove-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:redhat-access-plugin-openstack-0:6.0.3-1.el7ost.noarch",
"7Server-RH7-RHOS-6.0:redhat-access-plugin-openstack-0:6.0.3-1.el7ost.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "mysql: unspecified vulnerability related to Server:InnoDB:DML (CPU Jan 2015)"
},
{
"cve": "CVE-2015-0374",
"discovery_date": "2015-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1184553"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote authenticated users to affect confidentiality via unknown vectors related to Server : Security : Privileges : Foreign Key.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: unspecified vulnerability related to Server:Security:Privileges:Foreign Key (CPU Jan 2015)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOS-6.0:diskimage-builder-0:0.1.34-21.el7ost.noarch",
"7Server-RH7-RHOS-6.0:diskimage-builder-0:0.1.34-21.el7ost.src",
"7Server-RH7-RHOS-6.0:mariadb-galera-1:5.5.41-2.el7ost.src",
"7Server-RH7-RHOS-6.0:mariadb-galera-common-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-6.0:mariadb-galera-debuginfo-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-6.0:mariadb-galera-server-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-6.0:openstack-selinux-0:0.6.29-1.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-selinux-0:0.6.29-1.el7ost.src",
"7Server-RH7-RHOS-6.0:openstack-trove-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-0:2014.2.3-3.el7ost.src",
"7Server-RH7-RHOS-6.0:openstack-trove-api-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-common-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-conductor-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-guestagent-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-taskmanager-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:python-trove-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:redhat-access-plugin-openstack-0:6.0.3-1.el7ost.noarch",
"7Server-RH7-RHOS-6.0:redhat-access-plugin-openstack-0:6.0.3-1.el7ost.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2015-0374"
},
{
"category": "external",
"summary": "RHBZ#1184553",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184553"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2015-0374",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0374"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-0374",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0374"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html#AppendixMSQL",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html#AppendixMSQL"
}
],
"release_date": "2015-01-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2015-05-05T13:30:45+00:00",
"details": "Before applying this update, ensure all previously released errata relevant to your system have been applied.\n\nRed Hat Enterprise Linux OpenStack Platform 6 runs on Red Hat Enterprise Linux 7.1.\n\nThis update is available through \u0027yum update\u0027 on systems registered through Red Hat Subscription Manager. For more information about Red Hat Subscription Manager, see:\nhttps://access.redhat.com/documentation/en-US/Red_Hat_Subscription_Management/1/html/RHSM/index.html\n\nRed Hat Enterprise Linux OpenStack Platform 6 documentation is available at:\nhttps://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux_OpenStack_Platform\n\nThe Red Hat Enterprise Linux OpenStack Platform 6 Release Notes (see the References section) contain the following:\n* Technology Previews, Recommended Practices, and Known Issues.\n* The channels required for Red Hat Enterprise Linux OpenStack Platform 6, including which channels need to be enabled and disabled.",
"product_ids": [
"7Server-RH7-RHOS-6.0:diskimage-builder-0:0.1.34-21.el7ost.noarch",
"7Server-RH7-RHOS-6.0:diskimage-builder-0:0.1.34-21.el7ost.src",
"7Server-RH7-RHOS-6.0:mariadb-galera-1:5.5.41-2.el7ost.src",
"7Server-RH7-RHOS-6.0:mariadb-galera-common-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-6.0:mariadb-galera-debuginfo-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-6.0:mariadb-galera-server-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-6.0:openstack-selinux-0:0.6.29-1.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-selinux-0:0.6.29-1.el7ost.src",
"7Server-RH7-RHOS-6.0:openstack-trove-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-0:2014.2.3-3.el7ost.src",
"7Server-RH7-RHOS-6.0:openstack-trove-api-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-common-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-conductor-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-guestagent-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-taskmanager-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:python-trove-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:redhat-access-plugin-openstack-0:6.0.3-1.el7ost.noarch",
"7Server-RH7-RHOS-6.0:redhat-access-plugin-openstack-0:6.0.3-1.el7ost.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2015:0928"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"7Server-RH7-RHOS-6.0:diskimage-builder-0:0.1.34-21.el7ost.noarch",
"7Server-RH7-RHOS-6.0:diskimage-builder-0:0.1.34-21.el7ost.src",
"7Server-RH7-RHOS-6.0:mariadb-galera-1:5.5.41-2.el7ost.src",
"7Server-RH7-RHOS-6.0:mariadb-galera-common-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-6.0:mariadb-galera-debuginfo-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-6.0:mariadb-galera-server-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-6.0:openstack-selinux-0:0.6.29-1.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-selinux-0:0.6.29-1.el7ost.src",
"7Server-RH7-RHOS-6.0:openstack-trove-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-0:2014.2.3-3.el7ost.src",
"7Server-RH7-RHOS-6.0:openstack-trove-api-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-common-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-conductor-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-guestagent-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-taskmanager-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:python-trove-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:redhat-access-plugin-openstack-0:6.0.3-1.el7ost.noarch",
"7Server-RH7-RHOS-6.0:redhat-access-plugin-openstack-0:6.0.3-1.el7ost.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "mysql: unspecified vulnerability related to Server:Security:Privileges:Foreign Key (CPU Jan 2015)"
},
{
"cve": "CVE-2015-0381",
"discovery_date": "2015-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1184554"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote attackers to affect availability via unknown vectors related to Server : Replication, a different vulnerability than CVE-2015-0382.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: unspecified vulnerability related to Server:Replication (CPU Jan 2015)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOS-6.0:diskimage-builder-0:0.1.34-21.el7ost.noarch",
"7Server-RH7-RHOS-6.0:diskimage-builder-0:0.1.34-21.el7ost.src",
"7Server-RH7-RHOS-6.0:mariadb-galera-1:5.5.41-2.el7ost.src",
"7Server-RH7-RHOS-6.0:mariadb-galera-common-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-6.0:mariadb-galera-debuginfo-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-6.0:mariadb-galera-server-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-6.0:openstack-selinux-0:0.6.29-1.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-selinux-0:0.6.29-1.el7ost.src",
"7Server-RH7-RHOS-6.0:openstack-trove-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-0:2014.2.3-3.el7ost.src",
"7Server-RH7-RHOS-6.0:openstack-trove-api-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-common-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-conductor-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-guestagent-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-taskmanager-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:python-trove-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:redhat-access-plugin-openstack-0:6.0.3-1.el7ost.noarch",
"7Server-RH7-RHOS-6.0:redhat-access-plugin-openstack-0:6.0.3-1.el7ost.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2015-0381"
},
{
"category": "external",
"summary": "RHBZ#1184554",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184554"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2015-0381",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0381"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-0381",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0381"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html#AppendixMSQL",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html#AppendixMSQL"
}
],
"release_date": "2015-01-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2015-05-05T13:30:45+00:00",
"details": "Before applying this update, ensure all previously released errata relevant to your system have been applied.\n\nRed Hat Enterprise Linux OpenStack Platform 6 runs on Red Hat Enterprise Linux 7.1.\n\nThis update is available through \u0027yum update\u0027 on systems registered through Red Hat Subscription Manager. For more information about Red Hat Subscription Manager, see:\nhttps://access.redhat.com/documentation/en-US/Red_Hat_Subscription_Management/1/html/RHSM/index.html\n\nRed Hat Enterprise Linux OpenStack Platform 6 documentation is available at:\nhttps://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux_OpenStack_Platform\n\nThe Red Hat Enterprise Linux OpenStack Platform 6 Release Notes (see the References section) contain the following:\n* Technology Previews, Recommended Practices, and Known Issues.\n* The channels required for Red Hat Enterprise Linux OpenStack Platform 6, including which channels need to be enabled and disabled.",
"product_ids": [
"7Server-RH7-RHOS-6.0:diskimage-builder-0:0.1.34-21.el7ost.noarch",
"7Server-RH7-RHOS-6.0:diskimage-builder-0:0.1.34-21.el7ost.src",
"7Server-RH7-RHOS-6.0:mariadb-galera-1:5.5.41-2.el7ost.src",
"7Server-RH7-RHOS-6.0:mariadb-galera-common-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-6.0:mariadb-galera-debuginfo-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-6.0:mariadb-galera-server-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-6.0:openstack-selinux-0:0.6.29-1.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-selinux-0:0.6.29-1.el7ost.src",
"7Server-RH7-RHOS-6.0:openstack-trove-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-0:2014.2.3-3.el7ost.src",
"7Server-RH7-RHOS-6.0:openstack-trove-api-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-common-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-conductor-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-guestagent-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-taskmanager-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:python-trove-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:redhat-access-plugin-openstack-0:6.0.3-1.el7ost.noarch",
"7Server-RH7-RHOS-6.0:redhat-access-plugin-openstack-0:6.0.3-1.el7ost.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2015:0928"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"7Server-RH7-RHOS-6.0:diskimage-builder-0:0.1.34-21.el7ost.noarch",
"7Server-RH7-RHOS-6.0:diskimage-builder-0:0.1.34-21.el7ost.src",
"7Server-RH7-RHOS-6.0:mariadb-galera-1:5.5.41-2.el7ost.src",
"7Server-RH7-RHOS-6.0:mariadb-galera-common-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-6.0:mariadb-galera-debuginfo-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-6.0:mariadb-galera-server-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-6.0:openstack-selinux-0:0.6.29-1.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-selinux-0:0.6.29-1.el7ost.src",
"7Server-RH7-RHOS-6.0:openstack-trove-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-0:2014.2.3-3.el7ost.src",
"7Server-RH7-RHOS-6.0:openstack-trove-api-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-common-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-conductor-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-guestagent-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-taskmanager-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:python-trove-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:redhat-access-plugin-openstack-0:6.0.3-1.el7ost.noarch",
"7Server-RH7-RHOS-6.0:redhat-access-plugin-openstack-0:6.0.3-1.el7ost.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: unspecified vulnerability related to Server:Replication (CPU Jan 2015)"
},
{
"cve": "CVE-2015-0382",
"discovery_date": "2015-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1184555"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote attackers to affect availability via unknown vectors related to Server : Replication, a different vulnerability than CVE-2015-0381.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: unspecified vulnerability related to Server:Replication (CPU Jan 2015)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOS-6.0:diskimage-builder-0:0.1.34-21.el7ost.noarch",
"7Server-RH7-RHOS-6.0:diskimage-builder-0:0.1.34-21.el7ost.src",
"7Server-RH7-RHOS-6.0:mariadb-galera-1:5.5.41-2.el7ost.src",
"7Server-RH7-RHOS-6.0:mariadb-galera-common-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-6.0:mariadb-galera-debuginfo-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-6.0:mariadb-galera-server-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-6.0:openstack-selinux-0:0.6.29-1.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-selinux-0:0.6.29-1.el7ost.src",
"7Server-RH7-RHOS-6.0:openstack-trove-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-0:2014.2.3-3.el7ost.src",
"7Server-RH7-RHOS-6.0:openstack-trove-api-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-common-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-conductor-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-guestagent-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-taskmanager-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:python-trove-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:redhat-access-plugin-openstack-0:6.0.3-1.el7ost.noarch",
"7Server-RH7-RHOS-6.0:redhat-access-plugin-openstack-0:6.0.3-1.el7ost.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2015-0382"
},
{
"category": "external",
"summary": "RHBZ#1184555",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184555"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2015-0382",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0382"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-0382",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0382"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html#AppendixMSQL",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html#AppendixMSQL"
}
],
"release_date": "2015-01-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2015-05-05T13:30:45+00:00",
"details": "Before applying this update, ensure all previously released errata relevant to your system have been applied.\n\nRed Hat Enterprise Linux OpenStack Platform 6 runs on Red Hat Enterprise Linux 7.1.\n\nThis update is available through \u0027yum update\u0027 on systems registered through Red Hat Subscription Manager. For more information about Red Hat Subscription Manager, see:\nhttps://access.redhat.com/documentation/en-US/Red_Hat_Subscription_Management/1/html/RHSM/index.html\n\nRed Hat Enterprise Linux OpenStack Platform 6 documentation is available at:\nhttps://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux_OpenStack_Platform\n\nThe Red Hat Enterprise Linux OpenStack Platform 6 Release Notes (see the References section) contain the following:\n* Technology Previews, Recommended Practices, and Known Issues.\n* The channels required for Red Hat Enterprise Linux OpenStack Platform 6, including which channels need to be enabled and disabled.",
"product_ids": [
"7Server-RH7-RHOS-6.0:diskimage-builder-0:0.1.34-21.el7ost.noarch",
"7Server-RH7-RHOS-6.0:diskimage-builder-0:0.1.34-21.el7ost.src",
"7Server-RH7-RHOS-6.0:mariadb-galera-1:5.5.41-2.el7ost.src",
"7Server-RH7-RHOS-6.0:mariadb-galera-common-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-6.0:mariadb-galera-debuginfo-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-6.0:mariadb-galera-server-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-6.0:openstack-selinux-0:0.6.29-1.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-selinux-0:0.6.29-1.el7ost.src",
"7Server-RH7-RHOS-6.0:openstack-trove-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-0:2014.2.3-3.el7ost.src",
"7Server-RH7-RHOS-6.0:openstack-trove-api-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-common-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-conductor-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-guestagent-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-taskmanager-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:python-trove-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:redhat-access-plugin-openstack-0:6.0.3-1.el7ost.noarch",
"7Server-RH7-RHOS-6.0:redhat-access-plugin-openstack-0:6.0.3-1.el7ost.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2015:0928"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"7Server-RH7-RHOS-6.0:diskimage-builder-0:0.1.34-21.el7ost.noarch",
"7Server-RH7-RHOS-6.0:diskimage-builder-0:0.1.34-21.el7ost.src",
"7Server-RH7-RHOS-6.0:mariadb-galera-1:5.5.41-2.el7ost.src",
"7Server-RH7-RHOS-6.0:mariadb-galera-common-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-6.0:mariadb-galera-debuginfo-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-6.0:mariadb-galera-server-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-6.0:openstack-selinux-0:0.6.29-1.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-selinux-0:0.6.29-1.el7ost.src",
"7Server-RH7-RHOS-6.0:openstack-trove-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-0:2014.2.3-3.el7ost.src",
"7Server-RH7-RHOS-6.0:openstack-trove-api-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-common-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-conductor-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-guestagent-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-taskmanager-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:python-trove-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:redhat-access-plugin-openstack-0:6.0.3-1.el7ost.noarch",
"7Server-RH7-RHOS-6.0:redhat-access-plugin-openstack-0:6.0.3-1.el7ost.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: unspecified vulnerability related to Server:Replication (CPU Jan 2015)"
},
{
"cve": "CVE-2015-0411",
"discovery_date": "2015-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1184560"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier, and 5.6.21 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Server : Security : Encryption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: unspecified vulnerability related to Server:Security:Encryption (CPU Jan 2015)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOS-6.0:diskimage-builder-0:0.1.34-21.el7ost.noarch",
"7Server-RH7-RHOS-6.0:diskimage-builder-0:0.1.34-21.el7ost.src",
"7Server-RH7-RHOS-6.0:mariadb-galera-1:5.5.41-2.el7ost.src",
"7Server-RH7-RHOS-6.0:mariadb-galera-common-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-6.0:mariadb-galera-debuginfo-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-6.0:mariadb-galera-server-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-6.0:openstack-selinux-0:0.6.29-1.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-selinux-0:0.6.29-1.el7ost.src",
"7Server-RH7-RHOS-6.0:openstack-trove-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-0:2014.2.3-3.el7ost.src",
"7Server-RH7-RHOS-6.0:openstack-trove-api-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-common-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-conductor-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-guestagent-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-taskmanager-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:python-trove-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:redhat-access-plugin-openstack-0:6.0.3-1.el7ost.noarch",
"7Server-RH7-RHOS-6.0:redhat-access-plugin-openstack-0:6.0.3-1.el7ost.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2015-0411"
},
{
"category": "external",
"summary": "RHBZ#1184560",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184560"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2015-0411",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0411"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-0411",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0411"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html#AppendixMSQL",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html#AppendixMSQL"
}
],
"release_date": "2015-01-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2015-05-05T13:30:45+00:00",
"details": "Before applying this update, ensure all previously released errata relevant to your system have been applied.\n\nRed Hat Enterprise Linux OpenStack Platform 6 runs on Red Hat Enterprise Linux 7.1.\n\nThis update is available through \u0027yum update\u0027 on systems registered through Red Hat Subscription Manager. For more information about Red Hat Subscription Manager, see:\nhttps://access.redhat.com/documentation/en-US/Red_Hat_Subscription_Management/1/html/RHSM/index.html\n\nRed Hat Enterprise Linux OpenStack Platform 6 documentation is available at:\nhttps://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux_OpenStack_Platform\n\nThe Red Hat Enterprise Linux OpenStack Platform 6 Release Notes (see the References section) contain the following:\n* Technology Previews, Recommended Practices, and Known Issues.\n* The channels required for Red Hat Enterprise Linux OpenStack Platform 6, including which channels need to be enabled and disabled.",
"product_ids": [
"7Server-RH7-RHOS-6.0:diskimage-builder-0:0.1.34-21.el7ost.noarch",
"7Server-RH7-RHOS-6.0:diskimage-builder-0:0.1.34-21.el7ost.src",
"7Server-RH7-RHOS-6.0:mariadb-galera-1:5.5.41-2.el7ost.src",
"7Server-RH7-RHOS-6.0:mariadb-galera-common-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-6.0:mariadb-galera-debuginfo-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-6.0:mariadb-galera-server-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-6.0:openstack-selinux-0:0.6.29-1.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-selinux-0:0.6.29-1.el7ost.src",
"7Server-RH7-RHOS-6.0:openstack-trove-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-0:2014.2.3-3.el7ost.src",
"7Server-RH7-RHOS-6.0:openstack-trove-api-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-common-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-conductor-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-guestagent-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-taskmanager-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:python-trove-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:redhat-access-plugin-openstack-0:6.0.3-1.el7ost.noarch",
"7Server-RH7-RHOS-6.0:redhat-access-plugin-openstack-0:6.0.3-1.el7ost.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2015:0928"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"7Server-RH7-RHOS-6.0:diskimage-builder-0:0.1.34-21.el7ost.noarch",
"7Server-RH7-RHOS-6.0:diskimage-builder-0:0.1.34-21.el7ost.src",
"7Server-RH7-RHOS-6.0:mariadb-galera-1:5.5.41-2.el7ost.src",
"7Server-RH7-RHOS-6.0:mariadb-galera-common-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-6.0:mariadb-galera-debuginfo-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-6.0:mariadb-galera-server-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-6.0:openstack-selinux-0:0.6.29-1.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-selinux-0:0.6.29-1.el7ost.src",
"7Server-RH7-RHOS-6.0:openstack-trove-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-0:2014.2.3-3.el7ost.src",
"7Server-RH7-RHOS-6.0:openstack-trove-api-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-common-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-conductor-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-guestagent-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-taskmanager-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:python-trove-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:redhat-access-plugin-openstack-0:6.0.3-1.el7ost.noarch",
"7Server-RH7-RHOS-6.0:redhat-access-plugin-openstack-0:6.0.3-1.el7ost.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: unspecified vulnerability related to Server:Security:Encryption (CPU Jan 2015)"
},
{
"cve": "CVE-2015-0432",
"discovery_date": "2015-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1184561"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier allows remote authenticated users to affect availability via vectors related to Server : InnoDB : DDL : Foreign Key.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: unspecified vulnerability related to Server:InnoDB:DDL:Foreign Key (CPU Jan 2015)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOS-6.0:diskimage-builder-0:0.1.34-21.el7ost.noarch",
"7Server-RH7-RHOS-6.0:diskimage-builder-0:0.1.34-21.el7ost.src",
"7Server-RH7-RHOS-6.0:mariadb-galera-1:5.5.41-2.el7ost.src",
"7Server-RH7-RHOS-6.0:mariadb-galera-common-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-6.0:mariadb-galera-debuginfo-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-6.0:mariadb-galera-server-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-6.0:openstack-selinux-0:0.6.29-1.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-selinux-0:0.6.29-1.el7ost.src",
"7Server-RH7-RHOS-6.0:openstack-trove-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-0:2014.2.3-3.el7ost.src",
"7Server-RH7-RHOS-6.0:openstack-trove-api-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-common-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-conductor-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-guestagent-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-taskmanager-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:python-trove-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:redhat-access-plugin-openstack-0:6.0.3-1.el7ost.noarch",
"7Server-RH7-RHOS-6.0:redhat-access-plugin-openstack-0:6.0.3-1.el7ost.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2015-0432"
},
{
"category": "external",
"summary": "RHBZ#1184561",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184561"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2015-0432",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0432"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-0432",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0432"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html#AppendixMSQL",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html#AppendixMSQL"
}
],
"release_date": "2015-01-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2015-05-05T13:30:45+00:00",
"details": "Before applying this update, ensure all previously released errata relevant to your system have been applied.\n\nRed Hat Enterprise Linux OpenStack Platform 6 runs on Red Hat Enterprise Linux 7.1.\n\nThis update is available through \u0027yum update\u0027 on systems registered through Red Hat Subscription Manager. For more information about Red Hat Subscription Manager, see:\nhttps://access.redhat.com/documentation/en-US/Red_Hat_Subscription_Management/1/html/RHSM/index.html\n\nRed Hat Enterprise Linux OpenStack Platform 6 documentation is available at:\nhttps://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux_OpenStack_Platform\n\nThe Red Hat Enterprise Linux OpenStack Platform 6 Release Notes (see the References section) contain the following:\n* Technology Previews, Recommended Practices, and Known Issues.\n* The channels required for Red Hat Enterprise Linux OpenStack Platform 6, including which channels need to be enabled and disabled.",
"product_ids": [
"7Server-RH7-RHOS-6.0:diskimage-builder-0:0.1.34-21.el7ost.noarch",
"7Server-RH7-RHOS-6.0:diskimage-builder-0:0.1.34-21.el7ost.src",
"7Server-RH7-RHOS-6.0:mariadb-galera-1:5.5.41-2.el7ost.src",
"7Server-RH7-RHOS-6.0:mariadb-galera-common-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-6.0:mariadb-galera-debuginfo-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-6.0:mariadb-galera-server-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-6.0:openstack-selinux-0:0.6.29-1.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-selinux-0:0.6.29-1.el7ost.src",
"7Server-RH7-RHOS-6.0:openstack-trove-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-0:2014.2.3-3.el7ost.src",
"7Server-RH7-RHOS-6.0:openstack-trove-api-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-common-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-conductor-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-guestagent-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-taskmanager-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:python-trove-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:redhat-access-plugin-openstack-0:6.0.3-1.el7ost.noarch",
"7Server-RH7-RHOS-6.0:redhat-access-plugin-openstack-0:6.0.3-1.el7ost.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2015:0928"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"7Server-RH7-RHOS-6.0:diskimage-builder-0:0.1.34-21.el7ost.noarch",
"7Server-RH7-RHOS-6.0:diskimage-builder-0:0.1.34-21.el7ost.src",
"7Server-RH7-RHOS-6.0:mariadb-galera-1:5.5.41-2.el7ost.src",
"7Server-RH7-RHOS-6.0:mariadb-galera-common-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-6.0:mariadb-galera-debuginfo-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-6.0:mariadb-galera-server-1:5.5.41-2.el7ost.x86_64",
"7Server-RH7-RHOS-6.0:openstack-selinux-0:0.6.29-1.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-selinux-0:0.6.29-1.el7ost.src",
"7Server-RH7-RHOS-6.0:openstack-trove-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-0:2014.2.3-3.el7ost.src",
"7Server-RH7-RHOS-6.0:openstack-trove-api-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-common-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-conductor-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-guestagent-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:openstack-trove-taskmanager-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:python-trove-0:2014.2.3-3.el7ost.noarch",
"7Server-RH7-RHOS-6.0:redhat-access-plugin-openstack-0:6.0.3-1.el7ost.noarch",
"7Server-RH7-RHOS-6.0:redhat-access-plugin-openstack-0:6.0.3-1.el7ost.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: unspecified vulnerability related to Server:InnoDB:DDL:Foreign Key (CPU Jan 2015)"
}
]
}
RHBA-2015_0820
Vulnerability from csaf_redhat - Published: 2015-04-16 14:28 - Updated: 2024-11-14 16:25Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier, and 5.6.21 and earlier, allows remote authenticated users to affect availability via vectors related to Server : InnoDB : DML.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-RH6-RHOS-5.0:ceph-0:0.80.5-4.el6ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:ceph-common-0:0.80.5-4.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:ceph-debuginfo-0:0.80.5-4.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:librados2-0:0.80.5-4.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:librbd1-0:0.80.5-4.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:mariadb-galera-0:5.5.41-1.el6ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:mariadb-galera-common-0:5.5.41-1.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:mariadb-galera-debuginfo-0:5.5.41-1.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:mariadb-galera-server-0:5.5.41-1.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-ceph-0:0.80.5-4.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-novaclient-doc-1:2.17.0-4.el6ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-sqlalchemy-debuginfo-0:0.8.4-2.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.src | — |
Vendor Fix
fix
|
Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote authenticated users to affect confidentiality via unknown vectors related to Server : Security : Privileges : Foreign Key.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-RH6-RHOS-5.0:ceph-0:0.80.5-4.el6ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:ceph-common-0:0.80.5-4.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:ceph-debuginfo-0:0.80.5-4.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:librados2-0:0.80.5-4.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:librbd1-0:0.80.5-4.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:mariadb-galera-0:5.5.41-1.el6ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:mariadb-galera-common-0:5.5.41-1.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:mariadb-galera-debuginfo-0:5.5.41-1.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:mariadb-galera-server-0:5.5.41-1.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-ceph-0:0.80.5-4.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-novaclient-doc-1:2.17.0-4.el6ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-sqlalchemy-debuginfo-0:0.8.4-2.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.src | — |
Vendor Fix
fix
|
Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote attackers to affect availability via unknown vectors related to Server : Replication, a different vulnerability than CVE-2015-0382.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-RH6-RHOS-5.0:ceph-0:0.80.5-4.el6ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:ceph-common-0:0.80.5-4.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:ceph-debuginfo-0:0.80.5-4.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:librados2-0:0.80.5-4.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:librbd1-0:0.80.5-4.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:mariadb-galera-0:5.5.41-1.el6ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:mariadb-galera-common-0:5.5.41-1.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:mariadb-galera-debuginfo-0:5.5.41-1.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:mariadb-galera-server-0:5.5.41-1.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-ceph-0:0.80.5-4.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-novaclient-doc-1:2.17.0-4.el6ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-sqlalchemy-debuginfo-0:0.8.4-2.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.src | — |
Vendor Fix
fix
|
Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote attackers to affect availability via unknown vectors related to Server : Replication, a different vulnerability than CVE-2015-0381.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-RH6-RHOS-5.0:ceph-0:0.80.5-4.el6ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:ceph-common-0:0.80.5-4.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:ceph-debuginfo-0:0.80.5-4.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:librados2-0:0.80.5-4.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:librbd1-0:0.80.5-4.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:mariadb-galera-0:5.5.41-1.el6ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:mariadb-galera-common-0:5.5.41-1.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:mariadb-galera-debuginfo-0:5.5.41-1.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:mariadb-galera-server-0:5.5.41-1.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-ceph-0:0.80.5-4.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-novaclient-doc-1:2.17.0-4.el6ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-sqlalchemy-debuginfo-0:0.8.4-2.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.src | — |
Vendor Fix
fix
|
Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier, and 5.6.21 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Server : Security : Encryption.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-RH6-RHOS-5.0:ceph-0:0.80.5-4.el6ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:ceph-common-0:0.80.5-4.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:ceph-debuginfo-0:0.80.5-4.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:librados2-0:0.80.5-4.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:librbd1-0:0.80.5-4.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:mariadb-galera-0:5.5.41-1.el6ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:mariadb-galera-common-0:5.5.41-1.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:mariadb-galera-debuginfo-0:5.5.41-1.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:mariadb-galera-server-0:5.5.41-1.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-ceph-0:0.80.5-4.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-novaclient-doc-1:2.17.0-4.el6ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-sqlalchemy-debuginfo-0:0.8.4-2.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.src | — |
Vendor Fix
fix
|
Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier allows remote authenticated users to affect availability via vectors related to Server : InnoDB : DDL : Foreign Key.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-RH6-RHOS-5.0:ceph-0:0.80.5-4.el6ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:ceph-common-0:0.80.5-4.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:ceph-debuginfo-0:0.80.5-4.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:librados2-0:0.80.5-4.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:librbd1-0:0.80.5-4.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:mariadb-galera-0:5.5.41-1.el6ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:mariadb-galera-common-0:5.5.41-1.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:mariadb-galera-debuginfo-0:5.5.41-1.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:mariadb-galera-server-0:5.5.41-1.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-ceph-0:0.80.5-4.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-novaclient-doc-1:2.17.0-4.el6ost.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-sqlalchemy-debuginfo-0:0.8.4-2.el6ost.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.src | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated packages that resolve various issues are now available for Red Hat\nEnterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Enterprise Linux OpenStack Platform provides the facilities for\nbuilding a private or public infrastructure-as-a-service (IaaS) cloud\nrunning on commonly available physical hardware.\n\nChanges to the ceph component:\n\n* In the previous version, launching of nova instances resulted in nova-compute to crash with a segmentation fault in certain cases when using Ceph RBD back end. This was due to the incorrect clean up in librbd1 packages. This has been fixed in this release, and nova-compute now operates correctly with Ceph RBD back end. (BZ#1182608)\n\nChanges to the python-novaclient component:\n\n* With this enhancement, a new command \u0027service-delete\u0027 has been added to the nova client to allow disabling services through the nova CLI as opposed to manually editing the nova-services table. (BZ#1206644)\n\nChanges to the python-requests component:\n\n* In the previous version, python-requests had issues including incorrect HTTP headers\u2019 generation, causing errors with python-swiftclient. This was due to python-requests having an incorrect implementation of a case insensitive mapping. With this release, case insensitive dictionary (CaseInsensitiveDict) has been updated which has fixed all issues with python-swiftclient. (BZ#1176181)\n\nChanges to the python-sqlalchemy component:\n\n* Previously, an improvement to the connection pool such that new connections could be made concurrently, made it so that the \u0027init on first connect\u0027 routine of a SQLAlchemy dialect would not have been completed if concurrent routines proceeded at the same time. As a result, when a SQLAlchemy engine was first used, operations which relied on the state acquired during initial startup could fail, as this information would not have been completed.\n\nTo resolve this issue, with this update, \u0027mutexing\u0027 was added to the event system which handles the initial dialect startup phase, so that connection attempts are again serialized, but only when the engine first starts up. (BZ#1198773)\n\n* Previously, the MySQL-Python DBAPI was observed under some circumstances using the ProgrammingError exception class to report on the \u0027command out of sync\u0027 errors, which is considered to be the case where a connection need to be thrown away; the SQLAlchemy dialect only expected this error to be emitted within the OperationalError class. As a result, in some cases a MySQL-Python connection that became corrupt would not signal to the SQLAlchemy engine that the pool of connections should be disposed, leading the engine not being able to proceed with new operations.\n\nWith this update, the error handling scheme of the MySQL-Python dialect is modified to expect either the OperationalError or ProgrammingError exception class when testing for this particular class of error. As a result, the SQLAlchemy engine/connection pool now correctly disposes off its connections when a MySQL-Python ProgrammingError delivers the \u0027command out of sync\u0027 error code. (BZ#1198774)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHBA-2015:0820",
"url": "https://access.redhat.com/errata/RHBA-2015:0820"
},
{
"category": "external",
"summary": "https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux_OpenStack_Platform/5/html/Release_Notes/index.html",
"url": "https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux_OpenStack_Platform/5/html/Release_Notes/index.html"
},
{
"category": "external",
"summary": "1168323",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1168323"
},
{
"category": "external",
"summary": "1176181",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1176181"
},
{
"category": "external",
"summary": "1183150",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183150"
},
{
"category": "external",
"summary": "1198773",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1198773"
},
{
"category": "external",
"summary": "1198774",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1198774"
},
{
"category": "external",
"summary": "1206644",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206644"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhba-2015_0820.json"
}
],
"title": "Red Hat Bug Fix Advisory: Red Hat Enterprise Linux OpenStack Platform Bug Fix and Enhancement Advisory",
"tracking": {
"current_release_date": "2024-11-14T16:25:59+00:00",
"generator": {
"date": "2024-11-14T16:25:59+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.0"
}
},
"id": "RHBA-2015:0820",
"initial_release_date": "2015-04-16T14:28:41+00:00",
"revision_history": [
{
"date": "2015-04-16T14:28:41+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2015-04-16T14:28:41+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-14T16:25:59+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6",
"product": {
"name": "Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6",
"product_id": "6Server-RH6-RHOS-5.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openstack:5::el6"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenStack Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "python-requests-0:2.3.0-1.el6.src",
"product": {
"name": "python-requests-0:2.3.0-1.el6.src",
"product_id": "python-requests-0:2.3.0-1.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-requests@2.3.0-1.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-novaclient-1:2.17.0-4.el6ost.src",
"product": {
"name": "python-novaclient-1:2.17.0-4.el6ost.src",
"product_id": "python-novaclient-1:2.17.0-4.el6ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-novaclient@2.17.0-4.el6ost?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "python-sqlalchemy-0:0.8.4-2.el6ost.src",
"product": {
"name": "python-sqlalchemy-0:0.8.4-2.el6ost.src",
"product_id": "python-sqlalchemy-0:0.8.4-2.el6ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-sqlalchemy@0.8.4-2.el6ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "openstack-utils-0:2014.2-1.el6ost.src",
"product": {
"name": "openstack-utils-0:2014.2-1.el6ost.src",
"product_id": "openstack-utils-0:2014.2-1.el6ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-utils@2014.2-1.el6ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "ceph-0:0.80.5-4.el6ost.src",
"product": {
"name": "ceph-0:0.80.5-4.el6ost.src",
"product_id": "ceph-0:0.80.5-4.el6ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ceph@0.80.5-4.el6ost?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-urllib3-0:1.8.2-4.1.el6.src",
"product": {
"name": "python-urllib3-0:1.8.2-4.1.el6.src",
"product_id": "python-urllib3-0:1.8.2-4.1.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-urllib3@1.8.2-4.1.el6?arch=src"
}
}
},
{
"category": "product_version",
"name": "mariadb-galera-0:5.5.41-1.el6ost.src",
"product": {
"name": "mariadb-galera-0:5.5.41-1.el6ost.src",
"product_id": "mariadb-galera-0:5.5.41-1.el6ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mariadb-galera@5.5.41-1.el6ost?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python-requests-0:2.3.0-1.el6.noarch",
"product": {
"name": "python-requests-0:2.3.0-1.el6.noarch",
"product_id": "python-requests-0:2.3.0-1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-requests@2.3.0-1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python-novaclient-1:2.17.0-4.el6ost.noarch",
"product": {
"name": "python-novaclient-1:2.17.0-4.el6ost.noarch",
"product_id": "python-novaclient-1:2.17.0-4.el6ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-novaclient@2.17.0-4.el6ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "python-novaclient-doc-1:2.17.0-4.el6ost.noarch",
"product": {
"name": "python-novaclient-doc-1:2.17.0-4.el6ost.noarch",
"product_id": "python-novaclient-doc-1:2.17.0-4.el6ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-novaclient-doc@2.17.0-4.el6ost?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "openstack-utils-0:2014.2-1.el6ost.noarch",
"product": {
"name": "openstack-utils-0:2014.2-1.el6ost.noarch",
"product_id": "openstack-utils-0:2014.2-1.el6ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openstack-utils@2014.2-1.el6ost?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python-urllib3-0:1.8.2-4.1.el6.noarch",
"product": {
"name": "python-urllib3-0:1.8.2-4.1.el6.noarch",
"product_id": "python-urllib3-0:1.8.2-4.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-urllib3@1.8.2-4.1.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "python-sqlalchemy-0:0.8.4-2.el6ost.x86_64",
"product": {
"name": "python-sqlalchemy-0:0.8.4-2.el6ost.x86_64",
"product_id": "python-sqlalchemy-0:0.8.4-2.el6ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-sqlalchemy@0.8.4-2.el6ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-sqlalchemy-debuginfo-0:0.8.4-2.el6ost.x86_64",
"product": {
"name": "python-sqlalchemy-debuginfo-0:0.8.4-2.el6ost.x86_64",
"product_id": "python-sqlalchemy-debuginfo-0:0.8.4-2.el6ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-sqlalchemy-debuginfo@0.8.4-2.el6ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ceph-common-0:0.80.5-4.el6ost.x86_64",
"product": {
"name": "ceph-common-0:0.80.5-4.el6ost.x86_64",
"product_id": "ceph-common-0:0.80.5-4.el6ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ceph-common@0.80.5-4.el6ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "librbd1-0:0.80.5-4.el6ost.x86_64",
"product": {
"name": "librbd1-0:0.80.5-4.el6ost.x86_64",
"product_id": "librbd1-0:0.80.5-4.el6ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/librbd1@0.80.5-4.el6ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-ceph-0:0.80.5-4.el6ost.x86_64",
"product": {
"name": "python-ceph-0:0.80.5-4.el6ost.x86_64",
"product_id": "python-ceph-0:0.80.5-4.el6ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-ceph@0.80.5-4.el6ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ceph-debuginfo-0:0.80.5-4.el6ost.x86_64",
"product": {
"name": "ceph-debuginfo-0:0.80.5-4.el6ost.x86_64",
"product_id": "ceph-debuginfo-0:0.80.5-4.el6ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ceph-debuginfo@0.80.5-4.el6ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "librados2-0:0.80.5-4.el6ost.x86_64",
"product": {
"name": "librados2-0:0.80.5-4.el6ost.x86_64",
"product_id": "librados2-0:0.80.5-4.el6ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/librados2@0.80.5-4.el6ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mariadb-galera-debuginfo-0:5.5.41-1.el6ost.x86_64",
"product": {
"name": "mariadb-galera-debuginfo-0:5.5.41-1.el6ost.x86_64",
"product_id": "mariadb-galera-debuginfo-0:5.5.41-1.el6ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mariadb-galera-debuginfo@5.5.41-1.el6ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mariadb-galera-common-0:5.5.41-1.el6ost.x86_64",
"product": {
"name": "mariadb-galera-common-0:5.5.41-1.el6ost.x86_64",
"product_id": "mariadb-galera-common-0:5.5.41-1.el6ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mariadb-galera-common@5.5.41-1.el6ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mariadb-galera-server-0:5.5.41-1.el6ost.x86_64",
"product": {
"name": "mariadb-galera-server-0:5.5.41-1.el6ost.x86_64",
"product_id": "mariadb-galera-server-0:5.5.41-1.el6ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mariadb-galera-server@5.5.41-1.el6ost?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ceph-0:0.80.5-4.el6ost.src as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6",
"product_id": "6Server-RH6-RHOS-5.0:ceph-0:0.80.5-4.el6ost.src"
},
"product_reference": "ceph-0:0.80.5-4.el6ost.src",
"relates_to_product_reference": "6Server-RH6-RHOS-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ceph-common-0:0.80.5-4.el6ost.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6",
"product_id": "6Server-RH6-RHOS-5.0:ceph-common-0:0.80.5-4.el6ost.x86_64"
},
"product_reference": "ceph-common-0:0.80.5-4.el6ost.x86_64",
"relates_to_product_reference": "6Server-RH6-RHOS-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ceph-debuginfo-0:0.80.5-4.el6ost.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6",
"product_id": "6Server-RH6-RHOS-5.0:ceph-debuginfo-0:0.80.5-4.el6ost.x86_64"
},
"product_reference": "ceph-debuginfo-0:0.80.5-4.el6ost.x86_64",
"relates_to_product_reference": "6Server-RH6-RHOS-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "librados2-0:0.80.5-4.el6ost.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6",
"product_id": "6Server-RH6-RHOS-5.0:librados2-0:0.80.5-4.el6ost.x86_64"
},
"product_reference": "librados2-0:0.80.5-4.el6ost.x86_64",
"relates_to_product_reference": "6Server-RH6-RHOS-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "librbd1-0:0.80.5-4.el6ost.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6",
"product_id": "6Server-RH6-RHOS-5.0:librbd1-0:0.80.5-4.el6ost.x86_64"
},
"product_reference": "librbd1-0:0.80.5-4.el6ost.x86_64",
"relates_to_product_reference": "6Server-RH6-RHOS-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mariadb-galera-0:5.5.41-1.el6ost.src as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6",
"product_id": "6Server-RH6-RHOS-5.0:mariadb-galera-0:5.5.41-1.el6ost.src"
},
"product_reference": "mariadb-galera-0:5.5.41-1.el6ost.src",
"relates_to_product_reference": "6Server-RH6-RHOS-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mariadb-galera-common-0:5.5.41-1.el6ost.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6",
"product_id": "6Server-RH6-RHOS-5.0:mariadb-galera-common-0:5.5.41-1.el6ost.x86_64"
},
"product_reference": "mariadb-galera-common-0:5.5.41-1.el6ost.x86_64",
"relates_to_product_reference": "6Server-RH6-RHOS-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mariadb-galera-debuginfo-0:5.5.41-1.el6ost.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6",
"product_id": "6Server-RH6-RHOS-5.0:mariadb-galera-debuginfo-0:5.5.41-1.el6ost.x86_64"
},
"product_reference": "mariadb-galera-debuginfo-0:5.5.41-1.el6ost.x86_64",
"relates_to_product_reference": "6Server-RH6-RHOS-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mariadb-galera-server-0:5.5.41-1.el6ost.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6",
"product_id": "6Server-RH6-RHOS-5.0:mariadb-galera-server-0:5.5.41-1.el6ost.x86_64"
},
"product_reference": "mariadb-galera-server-0:5.5.41-1.el6ost.x86_64",
"relates_to_product_reference": "6Server-RH6-RHOS-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-utils-0:2014.2-1.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6",
"product_id": "6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.noarch"
},
"product_reference": "openstack-utils-0:2014.2-1.el6ost.noarch",
"relates_to_product_reference": "6Server-RH6-RHOS-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openstack-utils-0:2014.2-1.el6ost.src as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6",
"product_id": "6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.src"
},
"product_reference": "openstack-utils-0:2014.2-1.el6ost.src",
"relates_to_product_reference": "6Server-RH6-RHOS-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-ceph-0:0.80.5-4.el6ost.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6",
"product_id": "6Server-RH6-RHOS-5.0:python-ceph-0:0.80.5-4.el6ost.x86_64"
},
"product_reference": "python-ceph-0:0.80.5-4.el6ost.x86_64",
"relates_to_product_reference": "6Server-RH6-RHOS-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-novaclient-1:2.17.0-4.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6",
"product_id": "6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.noarch"
},
"product_reference": "python-novaclient-1:2.17.0-4.el6ost.noarch",
"relates_to_product_reference": "6Server-RH6-RHOS-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-novaclient-1:2.17.0-4.el6ost.src as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6",
"product_id": "6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.src"
},
"product_reference": "python-novaclient-1:2.17.0-4.el6ost.src",
"relates_to_product_reference": "6Server-RH6-RHOS-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-novaclient-doc-1:2.17.0-4.el6ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6",
"product_id": "6Server-RH6-RHOS-5.0:python-novaclient-doc-1:2.17.0-4.el6ost.noarch"
},
"product_reference": "python-novaclient-doc-1:2.17.0-4.el6ost.noarch",
"relates_to_product_reference": "6Server-RH6-RHOS-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-requests-0:2.3.0-1.el6.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6",
"product_id": "6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.noarch"
},
"product_reference": "python-requests-0:2.3.0-1.el6.noarch",
"relates_to_product_reference": "6Server-RH6-RHOS-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-requests-0:2.3.0-1.el6.src as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6",
"product_id": "6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.src"
},
"product_reference": "python-requests-0:2.3.0-1.el6.src",
"relates_to_product_reference": "6Server-RH6-RHOS-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-sqlalchemy-0:0.8.4-2.el6ost.src as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6",
"product_id": "6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.src"
},
"product_reference": "python-sqlalchemy-0:0.8.4-2.el6ost.src",
"relates_to_product_reference": "6Server-RH6-RHOS-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-sqlalchemy-0:0.8.4-2.el6ost.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6",
"product_id": "6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.x86_64"
},
"product_reference": "python-sqlalchemy-0:0.8.4-2.el6ost.x86_64",
"relates_to_product_reference": "6Server-RH6-RHOS-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-sqlalchemy-debuginfo-0:0.8.4-2.el6ost.x86_64 as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6",
"product_id": "6Server-RH6-RHOS-5.0:python-sqlalchemy-debuginfo-0:0.8.4-2.el6ost.x86_64"
},
"product_reference": "python-sqlalchemy-debuginfo-0:0.8.4-2.el6ost.x86_64",
"relates_to_product_reference": "6Server-RH6-RHOS-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-urllib3-0:1.8.2-4.1.el6.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6",
"product_id": "6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.noarch"
},
"product_reference": "python-urllib3-0:1.8.2-4.1.el6.noarch",
"relates_to_product_reference": "6Server-RH6-RHOS-5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-urllib3-0:1.8.2-4.1.el6.src as a component of Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6",
"product_id": "6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.src"
},
"product_reference": "python-urllib3-0:1.8.2-4.1.el6.src",
"relates_to_product_reference": "6Server-RH6-RHOS-5.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2014-6568",
"discovery_date": "2015-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1184552"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier, and 5.6.21 and earlier, allows remote authenticated users to affect availability via vectors related to Server : InnoDB : DML.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: unspecified vulnerability related to Server:InnoDB:DML (CPU Jan 2015)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-RH6-RHOS-5.0:ceph-0:0.80.5-4.el6ost.src",
"6Server-RH6-RHOS-5.0:ceph-common-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:ceph-debuginfo-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:librados2-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:librbd1-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-0:5.5.41-1.el6ost.src",
"6Server-RH6-RHOS-5.0:mariadb-galera-common-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-debuginfo-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-server-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.noarch",
"6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.src",
"6Server-RH6-RHOS-5.0:python-ceph-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.noarch",
"6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.src",
"6Server-RH6-RHOS-5.0:python-novaclient-doc-1:2.17.0-4.el6ost.noarch",
"6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.noarch",
"6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.src",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.src",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-debuginfo-0:0.8.4-2.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.noarch",
"6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-6568"
},
{
"category": "external",
"summary": "RHBZ#1184552",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184552"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-6568",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6568"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-6568",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6568"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html#AppendixMSQL",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html#AppendixMSQL"
}
],
"release_date": "2015-01-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2015-04-16T14:28:41+00:00",
"details": "Before applying this update, ensure all previously released errata relevant to your system have been applied.\n\nRed Hat Enterprise Linux OpenStack Platform 5 runs on Red Hat Enterprise Linux 6.6.\n\nThe Red Hat Enterprise Linux OpenStack Platform 5 Release Notes (see References section) contain the following:\n* An explanation of the way in which the provided components interact to form a working cloud computing environment.\n* Technology Previews, Recommended Practices, and Known Issues.\n* The channels required for Red Hat Enterprise Linux OpenStack Platform 5, including which channels need to be enabled and disabled.\n\nThis update is available through the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258",
"product_ids": [
"6Server-RH6-RHOS-5.0:ceph-0:0.80.5-4.el6ost.src",
"6Server-RH6-RHOS-5.0:ceph-common-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:ceph-debuginfo-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:librados2-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:librbd1-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-0:5.5.41-1.el6ost.src",
"6Server-RH6-RHOS-5.0:mariadb-galera-common-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-debuginfo-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-server-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.noarch",
"6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.src",
"6Server-RH6-RHOS-5.0:python-ceph-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.noarch",
"6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.src",
"6Server-RH6-RHOS-5.0:python-novaclient-doc-1:2.17.0-4.el6ost.noarch",
"6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.noarch",
"6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.src",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.src",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-debuginfo-0:0.8.4-2.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.noarch",
"6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2015:0820"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"6Server-RH6-RHOS-5.0:ceph-0:0.80.5-4.el6ost.src",
"6Server-RH6-RHOS-5.0:ceph-common-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:ceph-debuginfo-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:librados2-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:librbd1-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-0:5.5.41-1.el6ost.src",
"6Server-RH6-RHOS-5.0:mariadb-galera-common-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-debuginfo-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-server-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.noarch",
"6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.src",
"6Server-RH6-RHOS-5.0:python-ceph-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.noarch",
"6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.src",
"6Server-RH6-RHOS-5.0:python-novaclient-doc-1:2.17.0-4.el6ost.noarch",
"6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.noarch",
"6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.src",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.src",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-debuginfo-0:0.8.4-2.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.noarch",
"6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "mysql: unspecified vulnerability related to Server:InnoDB:DML (CPU Jan 2015)"
},
{
"cve": "CVE-2015-0374",
"discovery_date": "2015-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1184553"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote authenticated users to affect confidentiality via unknown vectors related to Server : Security : Privileges : Foreign Key.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: unspecified vulnerability related to Server:Security:Privileges:Foreign Key (CPU Jan 2015)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-RH6-RHOS-5.0:ceph-0:0.80.5-4.el6ost.src",
"6Server-RH6-RHOS-5.0:ceph-common-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:ceph-debuginfo-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:librados2-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:librbd1-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-0:5.5.41-1.el6ost.src",
"6Server-RH6-RHOS-5.0:mariadb-galera-common-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-debuginfo-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-server-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.noarch",
"6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.src",
"6Server-RH6-RHOS-5.0:python-ceph-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.noarch",
"6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.src",
"6Server-RH6-RHOS-5.0:python-novaclient-doc-1:2.17.0-4.el6ost.noarch",
"6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.noarch",
"6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.src",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.src",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-debuginfo-0:0.8.4-2.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.noarch",
"6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2015-0374"
},
{
"category": "external",
"summary": "RHBZ#1184553",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184553"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2015-0374",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0374"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-0374",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0374"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html#AppendixMSQL",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html#AppendixMSQL"
}
],
"release_date": "2015-01-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2015-04-16T14:28:41+00:00",
"details": "Before applying this update, ensure all previously released errata relevant to your system have been applied.\n\nRed Hat Enterprise Linux OpenStack Platform 5 runs on Red Hat Enterprise Linux 6.6.\n\nThe Red Hat Enterprise Linux OpenStack Platform 5 Release Notes (see References section) contain the following:\n* An explanation of the way in which the provided components interact to form a working cloud computing environment.\n* Technology Previews, Recommended Practices, and Known Issues.\n* The channels required for Red Hat Enterprise Linux OpenStack Platform 5, including which channels need to be enabled and disabled.\n\nThis update is available through the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258",
"product_ids": [
"6Server-RH6-RHOS-5.0:ceph-0:0.80.5-4.el6ost.src",
"6Server-RH6-RHOS-5.0:ceph-common-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:ceph-debuginfo-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:librados2-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:librbd1-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-0:5.5.41-1.el6ost.src",
"6Server-RH6-RHOS-5.0:mariadb-galera-common-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-debuginfo-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-server-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.noarch",
"6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.src",
"6Server-RH6-RHOS-5.0:python-ceph-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.noarch",
"6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.src",
"6Server-RH6-RHOS-5.0:python-novaclient-doc-1:2.17.0-4.el6ost.noarch",
"6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.noarch",
"6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.src",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.src",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-debuginfo-0:0.8.4-2.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.noarch",
"6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2015:0820"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"6Server-RH6-RHOS-5.0:ceph-0:0.80.5-4.el6ost.src",
"6Server-RH6-RHOS-5.0:ceph-common-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:ceph-debuginfo-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:librados2-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:librbd1-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-0:5.5.41-1.el6ost.src",
"6Server-RH6-RHOS-5.0:mariadb-galera-common-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-debuginfo-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-server-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.noarch",
"6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.src",
"6Server-RH6-RHOS-5.0:python-ceph-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.noarch",
"6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.src",
"6Server-RH6-RHOS-5.0:python-novaclient-doc-1:2.17.0-4.el6ost.noarch",
"6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.noarch",
"6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.src",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.src",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-debuginfo-0:0.8.4-2.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.noarch",
"6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "mysql: unspecified vulnerability related to Server:Security:Privileges:Foreign Key (CPU Jan 2015)"
},
{
"cve": "CVE-2015-0381",
"discovery_date": "2015-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1184554"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote attackers to affect availability via unknown vectors related to Server : Replication, a different vulnerability than CVE-2015-0382.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: unspecified vulnerability related to Server:Replication (CPU Jan 2015)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-RH6-RHOS-5.0:ceph-0:0.80.5-4.el6ost.src",
"6Server-RH6-RHOS-5.0:ceph-common-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:ceph-debuginfo-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:librados2-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:librbd1-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-0:5.5.41-1.el6ost.src",
"6Server-RH6-RHOS-5.0:mariadb-galera-common-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-debuginfo-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-server-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.noarch",
"6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.src",
"6Server-RH6-RHOS-5.0:python-ceph-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.noarch",
"6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.src",
"6Server-RH6-RHOS-5.0:python-novaclient-doc-1:2.17.0-4.el6ost.noarch",
"6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.noarch",
"6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.src",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.src",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-debuginfo-0:0.8.4-2.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.noarch",
"6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2015-0381"
},
{
"category": "external",
"summary": "RHBZ#1184554",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184554"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2015-0381",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0381"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-0381",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0381"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html#AppendixMSQL",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html#AppendixMSQL"
}
],
"release_date": "2015-01-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2015-04-16T14:28:41+00:00",
"details": "Before applying this update, ensure all previously released errata relevant to your system have been applied.\n\nRed Hat Enterprise Linux OpenStack Platform 5 runs on Red Hat Enterprise Linux 6.6.\n\nThe Red Hat Enterprise Linux OpenStack Platform 5 Release Notes (see References section) contain the following:\n* An explanation of the way in which the provided components interact to form a working cloud computing environment.\n* Technology Previews, Recommended Practices, and Known Issues.\n* The channels required for Red Hat Enterprise Linux OpenStack Platform 5, including which channels need to be enabled and disabled.\n\nThis update is available through the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258",
"product_ids": [
"6Server-RH6-RHOS-5.0:ceph-0:0.80.5-4.el6ost.src",
"6Server-RH6-RHOS-5.0:ceph-common-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:ceph-debuginfo-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:librados2-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:librbd1-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-0:5.5.41-1.el6ost.src",
"6Server-RH6-RHOS-5.0:mariadb-galera-common-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-debuginfo-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-server-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.noarch",
"6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.src",
"6Server-RH6-RHOS-5.0:python-ceph-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.noarch",
"6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.src",
"6Server-RH6-RHOS-5.0:python-novaclient-doc-1:2.17.0-4.el6ost.noarch",
"6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.noarch",
"6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.src",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.src",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-debuginfo-0:0.8.4-2.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.noarch",
"6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2015:0820"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"6Server-RH6-RHOS-5.0:ceph-0:0.80.5-4.el6ost.src",
"6Server-RH6-RHOS-5.0:ceph-common-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:ceph-debuginfo-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:librados2-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:librbd1-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-0:5.5.41-1.el6ost.src",
"6Server-RH6-RHOS-5.0:mariadb-galera-common-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-debuginfo-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-server-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.noarch",
"6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.src",
"6Server-RH6-RHOS-5.0:python-ceph-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.noarch",
"6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.src",
"6Server-RH6-RHOS-5.0:python-novaclient-doc-1:2.17.0-4.el6ost.noarch",
"6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.noarch",
"6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.src",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.src",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-debuginfo-0:0.8.4-2.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.noarch",
"6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: unspecified vulnerability related to Server:Replication (CPU Jan 2015)"
},
{
"cve": "CVE-2015-0382",
"discovery_date": "2015-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1184555"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote attackers to affect availability via unknown vectors related to Server : Replication, a different vulnerability than CVE-2015-0381.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: unspecified vulnerability related to Server:Replication (CPU Jan 2015)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-RH6-RHOS-5.0:ceph-0:0.80.5-4.el6ost.src",
"6Server-RH6-RHOS-5.0:ceph-common-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:ceph-debuginfo-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:librados2-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:librbd1-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-0:5.5.41-1.el6ost.src",
"6Server-RH6-RHOS-5.0:mariadb-galera-common-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-debuginfo-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-server-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.noarch",
"6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.src",
"6Server-RH6-RHOS-5.0:python-ceph-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.noarch",
"6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.src",
"6Server-RH6-RHOS-5.0:python-novaclient-doc-1:2.17.0-4.el6ost.noarch",
"6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.noarch",
"6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.src",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.src",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-debuginfo-0:0.8.4-2.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.noarch",
"6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2015-0382"
},
{
"category": "external",
"summary": "RHBZ#1184555",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184555"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2015-0382",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0382"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-0382",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0382"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html#AppendixMSQL",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html#AppendixMSQL"
}
],
"release_date": "2015-01-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2015-04-16T14:28:41+00:00",
"details": "Before applying this update, ensure all previously released errata relevant to your system have been applied.\n\nRed Hat Enterprise Linux OpenStack Platform 5 runs on Red Hat Enterprise Linux 6.6.\n\nThe Red Hat Enterprise Linux OpenStack Platform 5 Release Notes (see References section) contain the following:\n* An explanation of the way in which the provided components interact to form a working cloud computing environment.\n* Technology Previews, Recommended Practices, and Known Issues.\n* The channels required for Red Hat Enterprise Linux OpenStack Platform 5, including which channels need to be enabled and disabled.\n\nThis update is available through the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258",
"product_ids": [
"6Server-RH6-RHOS-5.0:ceph-0:0.80.5-4.el6ost.src",
"6Server-RH6-RHOS-5.0:ceph-common-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:ceph-debuginfo-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:librados2-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:librbd1-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-0:5.5.41-1.el6ost.src",
"6Server-RH6-RHOS-5.0:mariadb-galera-common-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-debuginfo-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-server-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.noarch",
"6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.src",
"6Server-RH6-RHOS-5.0:python-ceph-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.noarch",
"6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.src",
"6Server-RH6-RHOS-5.0:python-novaclient-doc-1:2.17.0-4.el6ost.noarch",
"6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.noarch",
"6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.src",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.src",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-debuginfo-0:0.8.4-2.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.noarch",
"6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2015:0820"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"6Server-RH6-RHOS-5.0:ceph-0:0.80.5-4.el6ost.src",
"6Server-RH6-RHOS-5.0:ceph-common-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:ceph-debuginfo-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:librados2-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:librbd1-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-0:5.5.41-1.el6ost.src",
"6Server-RH6-RHOS-5.0:mariadb-galera-common-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-debuginfo-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-server-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.noarch",
"6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.src",
"6Server-RH6-RHOS-5.0:python-ceph-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.noarch",
"6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.src",
"6Server-RH6-RHOS-5.0:python-novaclient-doc-1:2.17.0-4.el6ost.noarch",
"6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.noarch",
"6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.src",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.src",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-debuginfo-0:0.8.4-2.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.noarch",
"6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: unspecified vulnerability related to Server:Replication (CPU Jan 2015)"
},
{
"cve": "CVE-2015-0411",
"discovery_date": "2015-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1184560"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier, and 5.6.21 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Server : Security : Encryption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: unspecified vulnerability related to Server:Security:Encryption (CPU Jan 2015)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-RH6-RHOS-5.0:ceph-0:0.80.5-4.el6ost.src",
"6Server-RH6-RHOS-5.0:ceph-common-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:ceph-debuginfo-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:librados2-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:librbd1-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-0:5.5.41-1.el6ost.src",
"6Server-RH6-RHOS-5.0:mariadb-galera-common-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-debuginfo-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-server-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.noarch",
"6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.src",
"6Server-RH6-RHOS-5.0:python-ceph-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.noarch",
"6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.src",
"6Server-RH6-RHOS-5.0:python-novaclient-doc-1:2.17.0-4.el6ost.noarch",
"6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.noarch",
"6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.src",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.src",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-debuginfo-0:0.8.4-2.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.noarch",
"6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2015-0411"
},
{
"category": "external",
"summary": "RHBZ#1184560",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184560"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2015-0411",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0411"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-0411",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0411"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html#AppendixMSQL",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html#AppendixMSQL"
}
],
"release_date": "2015-01-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2015-04-16T14:28:41+00:00",
"details": "Before applying this update, ensure all previously released errata relevant to your system have been applied.\n\nRed Hat Enterprise Linux OpenStack Platform 5 runs on Red Hat Enterprise Linux 6.6.\n\nThe Red Hat Enterprise Linux OpenStack Platform 5 Release Notes (see References section) contain the following:\n* An explanation of the way in which the provided components interact to form a working cloud computing environment.\n* Technology Previews, Recommended Practices, and Known Issues.\n* The channels required for Red Hat Enterprise Linux OpenStack Platform 5, including which channels need to be enabled and disabled.\n\nThis update is available through the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258",
"product_ids": [
"6Server-RH6-RHOS-5.0:ceph-0:0.80.5-4.el6ost.src",
"6Server-RH6-RHOS-5.0:ceph-common-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:ceph-debuginfo-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:librados2-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:librbd1-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-0:5.5.41-1.el6ost.src",
"6Server-RH6-RHOS-5.0:mariadb-galera-common-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-debuginfo-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-server-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.noarch",
"6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.src",
"6Server-RH6-RHOS-5.0:python-ceph-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.noarch",
"6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.src",
"6Server-RH6-RHOS-5.0:python-novaclient-doc-1:2.17.0-4.el6ost.noarch",
"6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.noarch",
"6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.src",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.src",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-debuginfo-0:0.8.4-2.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.noarch",
"6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2015:0820"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"6Server-RH6-RHOS-5.0:ceph-0:0.80.5-4.el6ost.src",
"6Server-RH6-RHOS-5.0:ceph-common-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:ceph-debuginfo-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:librados2-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:librbd1-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-0:5.5.41-1.el6ost.src",
"6Server-RH6-RHOS-5.0:mariadb-galera-common-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-debuginfo-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-server-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.noarch",
"6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.src",
"6Server-RH6-RHOS-5.0:python-ceph-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.noarch",
"6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.src",
"6Server-RH6-RHOS-5.0:python-novaclient-doc-1:2.17.0-4.el6ost.noarch",
"6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.noarch",
"6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.src",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.src",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-debuginfo-0:0.8.4-2.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.noarch",
"6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: unspecified vulnerability related to Server:Security:Encryption (CPU Jan 2015)"
},
{
"cve": "CVE-2015-0432",
"discovery_date": "2015-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1184561"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier allows remote authenticated users to affect availability via vectors related to Server : InnoDB : DDL : Foreign Key.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mysql: unspecified vulnerability related to Server:InnoDB:DDL:Foreign Key (CPU Jan 2015)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-RH6-RHOS-5.0:ceph-0:0.80.5-4.el6ost.src",
"6Server-RH6-RHOS-5.0:ceph-common-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:ceph-debuginfo-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:librados2-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:librbd1-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-0:5.5.41-1.el6ost.src",
"6Server-RH6-RHOS-5.0:mariadb-galera-common-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-debuginfo-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-server-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.noarch",
"6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.src",
"6Server-RH6-RHOS-5.0:python-ceph-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.noarch",
"6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.src",
"6Server-RH6-RHOS-5.0:python-novaclient-doc-1:2.17.0-4.el6ost.noarch",
"6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.noarch",
"6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.src",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.src",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-debuginfo-0:0.8.4-2.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.noarch",
"6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2015-0432"
},
{
"category": "external",
"summary": "RHBZ#1184561",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184561"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2015-0432",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0432"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-0432",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0432"
},
{
"category": "external",
"summary": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html#AppendixMSQL",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html#AppendixMSQL"
}
],
"release_date": "2015-01-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2015-04-16T14:28:41+00:00",
"details": "Before applying this update, ensure all previously released errata relevant to your system have been applied.\n\nRed Hat Enterprise Linux OpenStack Platform 5 runs on Red Hat Enterprise Linux 6.6.\n\nThe Red Hat Enterprise Linux OpenStack Platform 5 Release Notes (see References section) contain the following:\n* An explanation of the way in which the provided components interact to form a working cloud computing environment.\n* Technology Previews, Recommended Practices, and Known Issues.\n* The channels required for Red Hat Enterprise Linux OpenStack Platform 5, including which channels need to be enabled and disabled.\n\nThis update is available through the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258",
"product_ids": [
"6Server-RH6-RHOS-5.0:ceph-0:0.80.5-4.el6ost.src",
"6Server-RH6-RHOS-5.0:ceph-common-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:ceph-debuginfo-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:librados2-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:librbd1-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-0:5.5.41-1.el6ost.src",
"6Server-RH6-RHOS-5.0:mariadb-galera-common-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-debuginfo-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-server-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.noarch",
"6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.src",
"6Server-RH6-RHOS-5.0:python-ceph-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.noarch",
"6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.src",
"6Server-RH6-RHOS-5.0:python-novaclient-doc-1:2.17.0-4.el6ost.noarch",
"6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.noarch",
"6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.src",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.src",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-debuginfo-0:0.8.4-2.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.noarch",
"6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2015:0820"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"6Server-RH6-RHOS-5.0:ceph-0:0.80.5-4.el6ost.src",
"6Server-RH6-RHOS-5.0:ceph-common-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:ceph-debuginfo-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:librados2-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:librbd1-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-0:5.5.41-1.el6ost.src",
"6Server-RH6-RHOS-5.0:mariadb-galera-common-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-debuginfo-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:mariadb-galera-server-0:5.5.41-1.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.noarch",
"6Server-RH6-RHOS-5.0:openstack-utils-0:2014.2-1.el6ost.src",
"6Server-RH6-RHOS-5.0:python-ceph-0:0.80.5-4.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.noarch",
"6Server-RH6-RHOS-5.0:python-novaclient-1:2.17.0-4.el6ost.src",
"6Server-RH6-RHOS-5.0:python-novaclient-doc-1:2.17.0-4.el6ost.noarch",
"6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.noarch",
"6Server-RH6-RHOS-5.0:python-requests-0:2.3.0-1.el6.src",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.src",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-0:0.8.4-2.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-sqlalchemy-debuginfo-0:0.8.4-2.el6ost.x86_64",
"6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.noarch",
"6Server-RH6-RHOS-5.0:python-urllib3-0:1.8.2-4.1.el6.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mysql: unspecified vulnerability related to Server:InnoDB:DDL:Foreign Key (CPU Jan 2015)"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.