2015-05-13 12:32:46 |
Christopher H. Laco |
bug |
|
|
added bug |
2015-05-13 12:35:59 |
Christopher H. Laco |
tags |
|
icehouse-backport-potential impacts-doc juno-backport-potential |
|
2015-05-13 12:44:37 |
Christopher H. Laco |
cve linked |
|
2015-3456 |
|
2015-05-13 13:05:04 |
Christopher H. Laco |
description |
With the public disclosure of CVE-2015-3456, the version of qemu will need to be bumped in Juno/Icehouse once the updated package is released upstream. The currently pinned version is qemu: 2.0.0+dfsg-2ubuntu1.2
Further information can be found:
http://venom.crowdstrike.com/
http://seclists.org/oss-sec/2015/q2/421
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3456 |
With the public disclosure of CVE-2015-3456, the version of qemu will need to be bumped in Juno/Icehouse once the updated package is released upstream. The currently pinned version is qemu: 2.0.0+dfsg-2ubuntu1.2
Further information can be found:
http://venom.crowdstrike.com/
http://seclists.org/oss-sec/2015/q2/421
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3456
https://rhn.redhat.com/errata/RHSA-2015-0998.html |
|
2015-05-13 13:09:20 |
Christopher H. Laco |
description |
With the public disclosure of CVE-2015-3456, the version of qemu will need to be bumped in Juno/Icehouse once the updated package is released upstream. The currently pinned version is qemu: 2.0.0+dfsg-2ubuntu1.2
Further information can be found:
http://venom.crowdstrike.com/
http://seclists.org/oss-sec/2015/q2/421
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3456
https://rhn.redhat.com/errata/RHSA-2015-0998.html |
With the public disclosure of CVE-2015-3456, the version of qemu will need to be bumped in Juno/Icehouse once the updated package is released upstream. The currently pinned version is qemu: 2.0.0+dfsg-2ubuntu1.2
Further information can be found:
http://venom.crowdstrike.com/
http://seclists.org/oss-sec/2015/q2/421
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3456
https://rhn.redhat.com/errata/RHSA-2015-0998.html
http://www.darkreading.com/cloud/venom-zero-day-may-affect-thousands-of-cloud-virtualization-products/d/d-id/1320389 |
|
2015-05-13 13:18:29 |
Kevin Carter |
nominated for series |
|
openstack-ansible/trunk |
|
2015-05-13 13:18:29 |
Kevin Carter |
bug task added |
|
openstack-ansible/trunk |
|
2015-05-13 13:18:29 |
Kevin Carter |
nominated for series |
|
openstack-ansible/icehouse |
|
2015-05-13 13:18:29 |
Kevin Carter |
bug task added |
|
openstack-ansible/icehouse |
|
2015-05-13 13:18:29 |
Kevin Carter |
nominated for series |
|
openstack-ansible/juno |
|
2015-05-13 13:18:29 |
Kevin Carter |
bug task added |
|
openstack-ansible/juno |
|
2015-05-13 13:19:12 |
Kevin Carter |
bug task deleted |
openstack-ansible/trunk |
|
|
2015-05-13 13:19:31 |
Kevin Carter |
openstack-ansible: status |
New |
Invalid |
|
2015-05-13 13:19:38 |
Kevin Carter |
openstack-ansible/icehouse: importance |
Undecided |
Critical |
|
2015-05-13 13:19:43 |
Kevin Carter |
openstack-ansible/juno: importance |
Undecided |
Critical |
|
2015-05-13 14:18:32 |
Christopher H. Laco |
description |
With the public disclosure of CVE-2015-3456, the version of qemu will need to be bumped in Juno/Icehouse once the updated package is released upstream. The currently pinned version is qemu: 2.0.0+dfsg-2ubuntu1.2
Further information can be found:
http://venom.crowdstrike.com/
http://seclists.org/oss-sec/2015/q2/421
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3456
https://rhn.redhat.com/errata/RHSA-2015-0998.html
http://www.darkreading.com/cloud/venom-zero-day-may-affect-thousands-of-cloud-virtualization-products/d/d-id/1320389 |
With the public disclosure of CVE-2015-3456, the version of qemu will need to be bumped in Juno/Icehouse once the updated package is released upstream. The currently pinned version is qemu: 2.0.0+dfsg-2ubuntu1.2
Further information can be found:
http://venom.crowdstrike.com/
http://seclists.org/oss-sec/2015/q2/421
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3456
https://rhn.redhat.com/errata/RHSA-2015-0998.html
http://www.darkreading.com/cloud/venom-zero-day-may-affect-thousands-of-cloud-virtualization-products/d/d-id/1320389
http://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-3456.html |
|
2015-05-13 15:54:25 |
Christopher H. Laco |
description |
With the public disclosure of CVE-2015-3456, the version of qemu will need to be bumped in Juno/Icehouse once the updated package is released upstream. The currently pinned version is qemu: 2.0.0+dfsg-2ubuntu1.2
Further information can be found:
http://venom.crowdstrike.com/
http://seclists.org/oss-sec/2015/q2/421
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3456
https://rhn.redhat.com/errata/RHSA-2015-0998.html
http://www.darkreading.com/cloud/venom-zero-day-may-affect-thousands-of-cloud-virtualization-products/d/d-id/1320389
http://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-3456.html |
With the public disclosure of CVE-2015-3456, the version of qemu will need to be bumped in Juno/Icehouse once the updated package is released upstream. The currently pinned version is qemu: 2.0.0+dfsg-2ubuntu1.2
Further information can be found:
http://venom.crowdstrike.com/
http://seclists.org/oss-sec/2015/q2/421
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3456
https://rhn.redhat.com/errata/RHSA-2015-0998.html
http://www.darkreading.com/cloud/venom-zero-day-may-affect-thousands-of-cloud-virtualization-products/d/d-id/1320389
http://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-3456.html
http://lists.openstack.org/pipermail/openstack-operators/2015-May/006945.html |
|
2015-05-13 16:11:14 |
Nathan Williams |
bug |
|
|
added subscriber Nathan Williams |
2015-05-13 17:23:51 |
Josh Simon |
bug |
|
|
added subscriber Josh Simon |
2015-05-13 17:31:00 |
Christopher H. Laco |
description |
With the public disclosure of CVE-2015-3456, the version of qemu will need to be bumped in Juno/Icehouse once the updated package is released upstream. The currently pinned version is qemu: 2.0.0+dfsg-2ubuntu1.2
Further information can be found:
http://venom.crowdstrike.com/
http://seclists.org/oss-sec/2015/q2/421
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3456
https://rhn.redhat.com/errata/RHSA-2015-0998.html
http://www.darkreading.com/cloud/venom-zero-day-may-affect-thousands-of-cloud-virtualization-products/d/d-id/1320389
http://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-3456.html
http://lists.openstack.org/pipermail/openstack-operators/2015-May/006945.html |
With the public disclosure of CVE-2015-3456, the version of qemu will need to be bumped in Juno/Icehouse once the updated package is released upstream. The currently pinned version is qemu: 2.0.0+dfsg-2ubuntu1.2
Further information can be found:
http://venom.crowdstrike.com/
http://seclists.org/oss-sec/2015/q2/421
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3456
https://rhn.redhat.com/errata/RHSA-2015-0998.html
http://www.darkreading.com/cloud/venom-zero-day-may-affect-thousands-of-cloud-virtualization-products/d/d-id/1320389
http://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-3456.html
http://lists.openstack.org/pipermail/openstack-operators/2015-May/006945.html
https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/VENOM |
|
2015-12-09 19:59:11 |
Kevin Carter |
openstack-ansible/icehouse: status |
New |
Won't Fix |
|
2015-12-09 19:59:14 |
Kevin Carter |
openstack-ansible/juno: status |
New |
Won't Fix |
|