Activity log for bug #1454677

Date Who What changed Old value New value Message
2015-05-13 12:32:46 Christopher H. Laco bug added bug
2015-05-13 12:35:59 Christopher H. Laco tags icehouse-backport-potential impacts-doc juno-backport-potential
2015-05-13 12:44:37 Christopher H. Laco cve linked 2015-3456
2015-05-13 13:05:04 Christopher H. Laco description With the public disclosure of CVE-2015-3456, the version of qemu will need to be bumped in Juno/Icehouse once the updated package is released upstream. The currently pinned version is qemu: 2.0.0+dfsg-2ubuntu1.2 Further information can be found: http://venom.crowdstrike.com/ http://seclists.org/oss-sec/2015/q2/421 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3456 With the public disclosure of CVE-2015-3456, the version of qemu will need to be bumped in Juno/Icehouse once the updated package is released upstream. The currently pinned version is qemu: 2.0.0+dfsg-2ubuntu1.2 Further information can be found: http://venom.crowdstrike.com/ http://seclists.org/oss-sec/2015/q2/421 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3456 https://rhn.redhat.com/errata/RHSA-2015-0998.html
2015-05-13 13:09:20 Christopher H. Laco description With the public disclosure of CVE-2015-3456, the version of qemu will need to be bumped in Juno/Icehouse once the updated package is released upstream. The currently pinned version is qemu: 2.0.0+dfsg-2ubuntu1.2 Further information can be found: http://venom.crowdstrike.com/ http://seclists.org/oss-sec/2015/q2/421 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3456 https://rhn.redhat.com/errata/RHSA-2015-0998.html With the public disclosure of CVE-2015-3456, the version of qemu will need to be bumped in Juno/Icehouse once the updated package is released upstream. The currently pinned version is qemu: 2.0.0+dfsg-2ubuntu1.2 Further information can be found: http://venom.crowdstrike.com/ http://seclists.org/oss-sec/2015/q2/421 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3456 https://rhn.redhat.com/errata/RHSA-2015-0998.html http://www.darkreading.com/cloud/venom-zero-day-may-affect-thousands-of-cloud-virtualization-products/d/d-id/1320389
2015-05-13 13:18:29 Kevin Carter nominated for series openstack-ansible/trunk
2015-05-13 13:18:29 Kevin Carter bug task added openstack-ansible/trunk
2015-05-13 13:18:29 Kevin Carter nominated for series openstack-ansible/icehouse
2015-05-13 13:18:29 Kevin Carter bug task added openstack-ansible/icehouse
2015-05-13 13:18:29 Kevin Carter nominated for series openstack-ansible/juno
2015-05-13 13:18:29 Kevin Carter bug task added openstack-ansible/juno
2015-05-13 13:19:12 Kevin Carter bug task deleted openstack-ansible/trunk
2015-05-13 13:19:31 Kevin Carter openstack-ansible: status New Invalid
2015-05-13 13:19:38 Kevin Carter openstack-ansible/icehouse: importance Undecided Critical
2015-05-13 13:19:43 Kevin Carter openstack-ansible/juno: importance Undecided Critical
2015-05-13 14:18:32 Christopher H. Laco description With the public disclosure of CVE-2015-3456, the version of qemu will need to be bumped in Juno/Icehouse once the updated package is released upstream. The currently pinned version is qemu: 2.0.0+dfsg-2ubuntu1.2 Further information can be found: http://venom.crowdstrike.com/ http://seclists.org/oss-sec/2015/q2/421 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3456 https://rhn.redhat.com/errata/RHSA-2015-0998.html http://www.darkreading.com/cloud/venom-zero-day-may-affect-thousands-of-cloud-virtualization-products/d/d-id/1320389 With the public disclosure of CVE-2015-3456, the version of qemu will need to be bumped in Juno/Icehouse once the updated package is released upstream. The currently pinned version is qemu: 2.0.0+dfsg-2ubuntu1.2 Further information can be found: http://venom.crowdstrike.com/ http://seclists.org/oss-sec/2015/q2/421 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3456 https://rhn.redhat.com/errata/RHSA-2015-0998.html http://www.darkreading.com/cloud/venom-zero-day-may-affect-thousands-of-cloud-virtualization-products/d/d-id/1320389 http://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-3456.html
2015-05-13 15:54:25 Christopher H. Laco description With the public disclosure of CVE-2015-3456, the version of qemu will need to be bumped in Juno/Icehouse once the updated package is released upstream. The currently pinned version is qemu: 2.0.0+dfsg-2ubuntu1.2 Further information can be found: http://venom.crowdstrike.com/ http://seclists.org/oss-sec/2015/q2/421 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3456 https://rhn.redhat.com/errata/RHSA-2015-0998.html http://www.darkreading.com/cloud/venom-zero-day-may-affect-thousands-of-cloud-virtualization-products/d/d-id/1320389 http://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-3456.html With the public disclosure of CVE-2015-3456, the version of qemu will need to be bumped in Juno/Icehouse once the updated package is released upstream. The currently pinned version is qemu: 2.0.0+dfsg-2ubuntu1.2 Further information can be found: http://venom.crowdstrike.com/ http://seclists.org/oss-sec/2015/q2/421 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3456 https://rhn.redhat.com/errata/RHSA-2015-0998.html http://www.darkreading.com/cloud/venom-zero-day-may-affect-thousands-of-cloud-virtualization-products/d/d-id/1320389 http://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-3456.html http://lists.openstack.org/pipermail/openstack-operators/2015-May/006945.html
2015-05-13 16:11:14 Nathan Williams bug added subscriber Nathan Williams
2015-05-13 17:23:51 Josh Simon bug added subscriber Josh Simon
2015-05-13 17:31:00 Christopher H. Laco description With the public disclosure of CVE-2015-3456, the version of qemu will need to be bumped in Juno/Icehouse once the updated package is released upstream. The currently pinned version is qemu: 2.0.0+dfsg-2ubuntu1.2 Further information can be found: http://venom.crowdstrike.com/ http://seclists.org/oss-sec/2015/q2/421 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3456 https://rhn.redhat.com/errata/RHSA-2015-0998.html http://www.darkreading.com/cloud/venom-zero-day-may-affect-thousands-of-cloud-virtualization-products/d/d-id/1320389 http://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-3456.html http://lists.openstack.org/pipermail/openstack-operators/2015-May/006945.html With the public disclosure of CVE-2015-3456, the version of qemu will need to be bumped in Juno/Icehouse once the updated package is released upstream. The currently pinned version is qemu: 2.0.0+dfsg-2ubuntu1.2 Further information can be found: http://venom.crowdstrike.com/ http://seclists.org/oss-sec/2015/q2/421 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3456 https://rhn.redhat.com/errata/RHSA-2015-0998.html http://www.darkreading.com/cloud/venom-zero-day-may-affect-thousands-of-cloud-virtualization-products/d/d-id/1320389 http://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-3456.html http://lists.openstack.org/pipermail/openstack-operators/2015-May/006945.html https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/VENOM
2015-12-09 19:59:11 Kevin Carter openstack-ansible/icehouse: status New Won't Fix
2015-12-09 19:59:14 Kevin Carter openstack-ansible/juno: status New Won't Fix