what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Red Hat Security Advisory 2015-1679-01

Red Hat Security Advisory 2015-1679-01
Posted Aug 24, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1679-01 - OpenStack Dashboard provides administrators and users with a graphical interface to access, provision, and automate cloud-based resources. Two security issues were discovered in the Horizon dashboard and are addressed in this update: A cross-site scripting flaw was found in the Horizon Orchestration dashboard. An attacker able to trick a Horizon user into using a malicious template during the stack creation could use this flaw to perform an XSS attack on that user.

tags | advisory, xss
systems | linux, redhat
advisories | CVE-2015-3219, CVE-2015-3988
SHA-256 | 049a53c2f8b49daf6583db34ebce131b70093bb11ff93f3c7cb8322e2b815093

Red Hat Security Advisory 2015-1679-01

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
Red Hat Security Advisory

Synopsis: Moderate: python-django-horizon security and bug fix update
Advisory ID: RHSA-2015:1679-01
Product: Red Hat Enterprise Linux OpenStack Platform
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1679.html
Issue date: 2015-08-24
CVE Names: CVE-2015-3219 CVE-2015-3988
=====================================================================

1. Summary:

Updated python-django-horizon packages that fix multiple security issues
are now available for Red Hat Enterprise Linux OpenStack Platform 6.0.

Red Hat Product Security has rated this update as having Moderate security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux OpenStack Platform 6.0 for RHEL 7 - noarch

3. Description:

OpenStack Dashboard (Horizon) provides administrators and users with a
graphical interface to access, provision, and automate cloud-based
resources.

Two security issues were discovered in the Horizon dashboard and are
addressed in this update:

* A cross-site scripting (XSS) flaw was found in the Horizon Orchestration
dashboard. An attacker able to trick a Horizon user into using a malicious
template during the stack creation could use this flaw to perform an XSS
attack on that user. (CVE-2015-3219)

Red Hat would like to thank the OpenStack Project for reporting the
CVE-2015-3219 issue. Upstream acknowledges Nikita Konovalov from Mirantis
as the original reporter of CVE-2015-3219.

* A flaw was discovered in the Horizon metadata dashboard whereby
potentially untrusted data was displayed from Glance images, Nova flavors,
or host aggregates without correct clean up. An attacker could use this
flaw to conduct an XSS attack.(CVE-2015-3988)

Additionally, the following non-security issues are addressed:

* It was impossible to associate a floating IP address to a port for an
instance. This occurred if the gateway router was not in the same tenant as
the instance but was attached to a network shared across tenants because
only ports within the tenant were used to find reachable gateway routers.
(BZ#1187992)

* If two or more regions were configured in Horizon, then the User, Help,
and Current Project links would no longer work and the region selector
was in the wrong location in the UI. (BZ#1189887)

* A load balancer monitor was erroneously displayed as associated with
every tenant in every pool. The load balancer monitor was not actually
associated with any tenants, but the improper display prevented users
from using the Horizon dashboard to create a tenant association.
(BZ#1196249)

* When logging into the Horizon dashboard, Horizon sends a query to Nova to
update usage statistics. One of the calls would erroneously query deleted
virtual machines; if there were thousands of deleted virtual machines, the
CPU usage for Nova would spike and the Nova process could crash.
(BZ#1243301)

* The network profile was not supported by Cisco N1KV ML2 drivers. This
profile has been removed to maintain Horizon compatibility with the Cisco
driver. (BZ#1246690)

* A neutron attribute extension was renamed from profile_id to profile for
networks and ports. This caused create operations for networks and ports to
fail from the dashboard since the dashboard was still using the attribute
name n1kv:profile_id rather than n1kv:profile.(BZ#1248367)

* If a virtual machine instance failed to launch, then the stale port
assignments were left in the configuration rather than being cleaned up.
(BZ#1249228)

All python-django-horizon users are advised to upgrade to these updated
packages, which correct these issues.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1187992 - [Horizon] Fix display of ports when associating floating IP
1196249 - LBaaS health monitor created from horizon shows associated with all pools
1222871 - CVE-2015-3988 python-django-horizon: persistent XSS in Horizon metadata dashboard
1228534 - CVE-2015-3219 python-django-horizon: XSS in Heat stack creation
1243301 - nova API cannot allocate memory due to horizon os-simple-tenant-usage calls

6. Package List:

Red Hat Enterprise Linux OpenStack Platform 6.0 for RHEL 7:

Source:
python-django-horizon-2014.2.3-7.el7ost.src.rpm

noarch:
openstack-dashboard-2014.2.3-7.el7ost.noarch.rpm
openstack-dashboard-theme-2014.2.3-7.el7ost.noarch.rpm
python-django-horizon-2014.2.3-7.el7ost.noarch.rpm
python-django-horizon-doc-2014.2.3-7.el7ost.noarch.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2015-3219
https://access.redhat.com/security/cve/CVE-2015-3988
https://access.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iD8DBQFV230AXlSAg2UNWIIRAn/lAKCuFqSiXKmhVoS+EaUZ58HjRAQoqgCgvrZf
8RwYnKPTmqyGHg8TwinHZSg=
=yb0o
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    17 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close