[Yahoo-eng-team] [Bug 1813439] Re: an instance can see other instances' unicast packages when security group firewall_driver is openvswitch

2019-07-22 Thread Tristan Cacqueray
** Also affects: ossn Importance: Undecided Status: New ** No longer affects: ossn -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to neutron. https://bugs.launchpad.net/bugs/1813439 Title: an instance can see other

[Yahoo-eng-team] [Bug 1837339] Re: CIDR's of the form 12.34.56.78/0 should be an error

2019-07-22 Thread Tristan Cacqueray
According to the VMT's taxonomy ( https://security.openstack.org/vmt- process.html#incident-report-taxonomy ) this seems like a class D. ** Also affects: ossn Importance: Undecided Status: New -- You received this bug notification because you are a member of Yahoo! Engineering Team,

[Yahoo-eng-team] [Bug 1813439] Re: an instance can see other instances' unicast packages when security group firewall_driver is openvswitch

2019-01-26 Thread Tristan Cacqueray
Since this report concerns a possible security risk, an incomplete security advisory task has been added while the core security reviewers for the affected project or projects confirm the bug and discuss the scope of any vulnerability along with potential solutions. Is this a mis-configuration

[Yahoo-eng-team] [Bug 1742102] Re: Simple user can disable compute

2018-05-31 Thread Tristan Cacqueray
Since this report concerns a possible security risk, an incomplete security advisory task has been added while the core security reviewers for the affected project or projects confirm the bug and discuss the scope of any vulnerability along with potential solutions. ** Also affects: ossa

[Yahoo-eng-team] [Bug 1774527] Re: Too many errors can trigger compute failed_builds to get incremented

2018-05-31 Thread Tristan Cacqueray
*** This bug is a duplicate of bug 1742102 *** https://bugs.launchpad.net/bugs/1742102 ** Also affects: ossa Importance: Undecided Status: New -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack Compute

[Yahoo-eng-team] [Bug 1711117] Re: paste_deploy flavor in sample configuration file shows misleading default

2017-12-17 Thread Tristan Cacqueray
** Also affects: ossn Importance: Undecided Status: New -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to Glance. https://bugs.launchpad.net/bugs/177 Title: paste_deploy flavor in sample configuration file shows

[Yahoo-eng-team] [Bug 1736674] Re: sg rules are sometimes not applied

2017-12-06 Thread Tristan Cacqueray
Since this report concerns a possible security risk, an incomplete security advisory task has been added while the core security reviewers for the affected project or projects confirm the bug and discuss the scope of any vulnerability along with potential solutions. ** Also affects: ossa

[Yahoo-eng-team] [Bug 1708580] Re: ovsfw ignores port_ranges under some conditions

2017-11-05 Thread Tristan Cacqueray
IWAMOTO, I guess you could use this definition: https://cve.mitre.org/about/terminology.html#vulnerability Then regarding the OSSA task, we don't issue advisories for experimental feature, and if I understand correctly, ovsfw is still experimental/incomplete. Thus if it's not a class D, then it

[Yahoo-eng-team] [Bug 1708580] Re: ovsfw ignores port_ranges under some conditions

2017-08-22 Thread Tristan Cacqueray
Since this report concerns a possible security risk, an incomplete security advisory task has been added while the core security reviewers for the affected project or projects confirm the bug and discuss the scope of any vulnerability along with potential solutions. Back in Mitaka, OVS was an

[Yahoo-eng-team] [Bug 1668503] Re: sha512_crypt is insufficient, use pbkdf2_sha512 for password hashing

2017-08-14 Thread Tristan Cacqueray
Adding OSSN task based on comment #3 ** Also affects: ossn Importance: Undecided Status: New ** Changed in: ossa Status: Incomplete => Won't Fix -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack Identity

[Yahoo-eng-team] [Bug 1703369] Re: get_identity_providers policy should be singular

2017-07-11 Thread Tristan Cacqueray
I've added an OSSN task to see if a Security Note would make more sense here since this is kind of an insecure default config value (class B2). ** Also affects: ossn Importance: Undecided Status: New -- You received this bug notification because you are a member of Yahoo! Engineering

[Yahoo-eng-team] [Bug 1618615] Re: Potential information disclosure in EC2 "credentials"

2017-05-23 Thread Tristan Cacqueray
Switched to public security, closed the OSSA task and added an OSSN task based on above comments. ** Description changed: - This issue is being treated as a potential security risk under embargo. - Please do not make any public mention of embargoed (private) security - vulnerabilities before

[Yahoo-eng-team] [Bug 1682062] Re: Nova polcy allows all users with same tenant to delete/resize servers with all roles (viewer, non-admin roles)

2017-04-12 Thread Tristan Cacqueray
Since this report concerns a possible security risk, an incomplete security advisory task has been added while the core security reviewers for the affected project or projects confirm the bug and discuss the scope of any vulnerability along with potential solutions. ** Also affects: ossa

[Yahoo-eng-team] [Bug 1649248] Re: Glance image upload wizard does not restrict invalid image files

2017-03-14 Thread Tristan Cacqueray
Opening this report and adding an OSSN task based on above comments. ** Description changed: - This issue is being treated as a potential security risk under embargo. - Please do not make any public mention of embargoed (private) security - vulnerabilities before their coordinated publication by

[Yahoo-eng-team] [Bug 1606500] Re: [OSSA 2016-013] Heat: template source URL allows network port scan (CVE-2016-9185)

2016-11-18 Thread Tristan Cacqueray
** Summary changed: - Heat: template source URL allows network port scan (CVE-2016-9185) + [OSSA 2016-013] Heat: template source URL allows network port scan (CVE-2016-9185) ** Changed in: ossa Status: In Progress => Fix Released -- You received this bug notification because you are a

[Yahoo-eng-team] [Bug 1606500] Re: Heat: template source URL allows network port scan

2016-11-02 Thread Tristan Cacqueray
CVE has been requested with this affect line: <=5.0.3, >=6.0.0 <=6.1.0 and ==7.0.0 @Daniel, the bug is now public, feel free to submit patches to gerrit for master (Ocata), Newton, Mikata and Liberty. ** Description changed: - This issue is being treated as a potential security risk under

[Yahoo-eng-team] [Bug 1625619] Re: It is possible to download key pair for other user at the same project

2016-09-27 Thread Tristan Cacqueray
Removed the security tags since it's a class E (or at best class D) according to the VMT taxonomy: https://security.openstack.org/vmt- process.html#incident-report-taxonomy. ** Information type changed from Public Security to Public ** Changed in: ossa Status: Incomplete => Won't Fix **

[Yahoo-eng-team] [Bug 1625833] Re: Prevent open redirects as a result of workflow action

2016-09-27 Thread Tristan Cacqueray
I agree on the C1 class. ** Changed in: ossa Status: Incomplete => Won't Fix -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack Dashboard (Horizon). https://bugs.launchpad.net/bugs/1625833 Title: Prevent open

[Yahoo-eng-team] [Bug 1625619] Re: It is possible to download key pair for other user at the same project

2016-09-27 Thread Tristan Cacqueray
Oops, wrong bug updated. Well now that this is public, I've added keystone to check that bug. ** Also affects: keystone Importance: Undecided Status: New -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack

[Yahoo-eng-team] [Bug 1407092] Re: cinder-api reflects JavaScript input

2016-09-26 Thread Tristan Cacqueray
** Changed in: ossa Status: Incomplete => Won't Fix -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack Dashboard (Horizon). https://bugs.launchpad.net/bugs/1407092 Title: cinder-api reflects JavaScript input

[Yahoo-eng-team] [Bug 1589821] Re: cleanup_incomplete_migrations periodic task regression with commit 099cf53 (CVE-2016-7498)

2016-09-22 Thread Tristan Cacqueray
** Changed in: ossa Status: In Progress => Fix Released -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack Compute (nova). https://bugs.launchpad.net/bugs/1589821 Title: cleanup_incomplete_migrations periodic task

[Yahoo-eng-team] [Bug 1618879] Re: iptables rule always be thrashed when update a little rule

2016-08-31 Thread Tristan Cacqueray
Since this report concerns a possible security risk, an incomplete security advisory task has been added while the core security reviewers for the affected project or projects confirm the bug and discuss the scope of any vulnerability along with potential solutions. I've add the OSSA task since

[Yahoo-eng-team] [Bug 1611991] Re: [ovs firewall] Port 23 is open on booted vms with only ping/ssh on 22 allowed.

2016-08-28 Thread Tristan Cacqueray
Closing the OSSA task, reason: B3 type of bug according to VMT taxonomy ( https://security.openstack.org/vmt-process.html#incident-report- taxonomy ). ** Changed in: ossa Status: Incomplete => Won't Fix -- You received this bug notification because you are a member of Yahoo! Engineering

[Yahoo-eng-team] [Bug 1597864] Re: Horizon exposes keystone endpoint url when viewing login source code

2016-08-28 Thread Tristan Cacqueray
Closing the OSSA task, reason: C1 type of bug according to VMT taxonomy ( https://security.openstack.org/vmt-process.html#incident-report- taxonomy ). ** Changed in: ossa Status: Incomplete => Won't Fix -- You received this bug notification because you are a member of Yahoo! Engineering

[Yahoo-eng-team] [Bug 1611171] Re: re-runs self via sudo

2016-08-09 Thread Tristan Cacqueray
Since this report concerns a possible security risk, an incomplete security advisory task has been added while the core security reviewers for the affected project or projects confirm the bug and discuss the scope of any vulnerability along with potential solutions. It seems like a class D type

[Yahoo-eng-team] [Bug 1567673] Re: [OSSA-2016-010] Possible client side template injection in horizon (CVE-2016-4428)

2016-06-17 Thread Tristan Cacqueray
** Changed in: ossa Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack Dashboard (Horizon). https://bugs.launchpad.net/bugs/1567673 Title: [OSSA-2016-010] Possible client side

[Yahoo-eng-team] [Bug 1502933] Re: [OSSA-2016-009] ICMPv6 anti-spoofing rules are too permissive (CVE-2015-8914)

2016-06-14 Thread Tristan Cacqueray
** Summary changed: - ICMPv6 anti-spoofing rules are too permissive (CVE-2015-8914) + [OSSA-2016-009] ICMPv6 anti-spoofing rules are too permissive (CVE-2015-8914) ** Changed in: ossa Status: In Progress => Fix Released -- You received this bug notification because you are a member of

[Yahoo-eng-team] [Bug 1558658] Re: [OSSA-2016-009] Security Groups do not prevent MAC and/or IPv4 spoofing in DHCP requests (CVE-2016-5362 and CVE-2016-5363)

2016-06-14 Thread Tristan Cacqueray
** Summary changed: - Security Groups do not prevent MAC and/or IPv4 spoofing in DHCP requests (CVE-2016-5362 and CVE-2016-5363) + [OSSA-2016-009] Security Groups do not prevent MAC and/or IPv4 spoofing in DHCP requests (CVE-2016-5362 and CVE-2016-5363) ** Changed in: ossa Status: In

[Yahoo-eng-team] [Bug 1575225] Re: Neutron only permits IPv6 MLDv1 not v2

2016-06-13 Thread Tristan Cacqueray
Ok my bad, then the OSSA task needs to be removed. Thanks! ** Changed in: ossa Status: Incomplete => Won't Fix -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to neutron. https://bugs.launchpad.net/bugs/1575225 Title:

[Yahoo-eng-team] [Bug 1577558] Re: [OSSA 2016-008] v2.0 fernet tokens audit ids are inconsistent (CVE-2016-4911)

2016-06-13 Thread Tristan Cacqueray
** Changed in: ossa Status: In Progress => Fix Released -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack Identity (keystone). https://bugs.launchpad.net/bugs/1577558 Title: [OSSA 2016-008] v2.0 fernet tokens

[Yahoo-eng-team] [Bug 1589821] Re: cleanup_incomplete_migrations periodic task regression with commit 099cf53925c0a0275325339f21932273ee9ce2bc

2016-06-09 Thread Tristan Cacqueray
Since this report concerns a possible security risk, an incomplete security advisory task has been added while the core security reviewers for the affected project or projects confirm the bug and discuss the scope of any vulnerability along with potential solutions. So IIUC, nova mitaka

[Yahoo-eng-team] [Bug 1575909] Re: VPN shared PSK shown in plaintext

2016-05-30 Thread Tristan Cacqueray
Based on above comment, I removed the OSSA task. ** Changed in: ossa Status: Incomplete => Won't Fix -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack Dashboard (Horizon). https://bugs.launchpad.net/bugs/1575909

[Yahoo-eng-team] [Bug 1575225] Re: Neutron only permits IPv6 MLDv1 not v2

2016-05-17 Thread Tristan Cacqueray
Since this report concerns a possible security risk, an incomplete security advisory task has been added while the core security reviewers for the affected project or projects confirm the bug and discuss the scope of any vulnerability along with potential solutions. ** Also affects: ossa

[Yahoo-eng-team] [Bug 1534652] Re: Host machine exposed to tenant networks via IPv6

2016-05-16 Thread Tristan Cacqueray
Based on a similar report (bug 1302080), I've closed the OSSA task. However I've added an OSSN task to discuss an eventual Note about compute and controller firewalling requirements. ** Also affects: ossn Importance: Undecided Status: New ** Changed in: ossa Status: Incomplete

[Yahoo-eng-team] [Bug 1576765] Re: Potential DOS: Keystone Extra Fields

2016-05-09 Thread Tristan Cacqueray
Based on above comments, I've switch that bug to public and removed the OSSA task. ** Information type changed from Private Security to Public ** Description changed: - This issue is being treated as a potential security risk under embargo. - Please do not make any public mention of embargoed

[Yahoo-eng-team] [Bug 1553324] Re: potential DOS with revoke by id or audit_id

2016-04-30 Thread Tristan Cacqueray
** Changed in: ossa Status: Incomplete => Won't Fix -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack Identity (keystone). https://bugs.launchpad.net/bugs/1553324 Title: potential DOS with revoke by id or

[Yahoo-eng-team] [Bug 1558697] Re: [kilo] libvirt block migrations fail due to disk_info being an encoded JSON string

2016-03-30 Thread Tristan Cacqueray
** Changed in: ossa Status: Confirmed => Fix Released -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack Compute (nova). https://bugs.launchpad.net/bugs/1558697 Title: [kilo] libvirt block migrations fail due to

[Yahoo-eng-team] [Bug 1558697] Re: [kilo] libvirt block migrations fail due to disk_info being an encoded JSON string

2016-03-19 Thread Tristan Cacqueray
Since f302bf04 was referenced in the advisory, we may have to send another ERRATA to include the additional patch. I've added an OSSA task to keep track of that effort. ** Also affects: ossa Importance: Undecided Status: New ** Changed in: ossa Status: New => Incomplete -- You

[Yahoo-eng-team] [Bug 1548450] Re: [OSSA 2016-007] Host data leak during resize/migrate for raw-backed instances (CVE-2016-2140)

2016-03-14 Thread Tristan Cacqueray
** Changed in: ossa Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack Compute (nova). https://bugs.launchpad.net/bugs/1548450 Title: [OSSA 2016-007] Host data leak during

[Yahoo-eng-team] [Bug 1129748] Re: image files in _base should not be world-readable

2016-02-29 Thread Tristan Cacqueray
The /var/lib/nova/instances directory is likely to be a packaging issue, I don't know how disk image mode bits are set, but at least the disk info is explicitly written as 644 by nova/virt/libvirt/imagebackend.py. Anyway I closed the OSSA task since multi-user system is not a realistic threat for

[Yahoo-eng-team] [Bug 1129748] Re: image files in _base should not be world-readable

2016-02-26 Thread Tristan Cacqueray
Since this report concerns a possible security risk, an incomplete security advisory task has been added while the core security reviewers for the affected project or projects confirm the bug and discuss the scope of any vulnerability along with potential solutions. I agree with Robert, this

[Yahoo-eng-team] [Bug 1545789] Re: keystone ADMIN_TOKEN set by default can lead to default insecure deployment

2016-02-15 Thread Tristan Cacqueray
Agreed on the B1 (insecure default value), and I added an OSSN task for an eventual Security Note. Thank! ** Also affects: ossn Importance: Undecided Status: New -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to

[Yahoo-eng-team] [Bug 1525915] Re: [OSSA 2016-006] Normal user can change image status if show_multiple_locations has been set to true (CVE-2016-0757)

2016-02-08 Thread Tristan Cacqueray
** Description changed: - This issue is being treated as a potential security risk under embargo. - Please do not make any public mention of embargoed (private) security - vulnerabilities before their coordinated publication by the OpenStack - Vulnerability Management Team in the form of an

[Yahoo-eng-team] [Bug 1540208] Re: CSRF mechanism is not safe.

2016-02-08 Thread Tristan Cacqueray
** Changed in: ossa Status: Incomplete => Won't Fix -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack Dashboard (Horizon). https://bugs.launchpad.net/bugs/1540208 Title: CSRF mechanism is not safe. Status in

[Yahoo-eng-team] [Bug 1528676] Re: OpenLDAP password policy not enforced for password changes

2016-02-01 Thread Tristan Cacqueray
Agreed on class D, I closed the OSSA task, this could be re-opened whenever the situation changes. ** Changed in: ossa Status: Incomplete => Won't Fix -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack Identity

[Yahoo-eng-team] [Bug 1490804] Re: [OSSA 2015-005] PKI Token Revocation Bypass (CVE-2015-7546)

2016-01-29 Thread Tristan Cacqueray
** Summary changed: - [OSSA 2015-006] PKI Token Revocation Bypass (CVE-2015-7546) + [OSSA 2015-005] PKI Token Revocation Bypass (CVE-2015-7546) ** Changed in: ossa Status: Confirmed => Fix Released ** Summary changed: - [OSSA 2015-005] PKI Token Revocation Bypass (CVE-2015-7546) + [OSSA

[Yahoo-eng-team] [Bug 1534322] Re: On new port, traffic flow is allowed before security groups are programmed

2016-01-15 Thread Tristan Cacqueray
I've removed the privacy settings and put the OSSA tasks as Won't Fix since it's a C1 type of bug (according to VMT taxonomy https://security.openstack.org/vmt-process.html#incident-report-taxonomy ), This can be put back to incomplete if the situation changes. ** Information type changed from

[Yahoo-eng-team] [Bug 1524274] Re: [OSSA 2016-001] Unprivileged api user can access host data using instance snapshot (CVE-2015-7548)

2016-01-07 Thread Tristan Cacqueray
** Changed in: ossa Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack Compute (nova). https://bugs.launchpad.net/bugs/1524274 Title: [OSSA 2016-001] Unprivileged api user can

[Yahoo-eng-team] [Bug 1524675] Re: lbaasv2-agent is logging credentials from barbican

2016-01-05 Thread Tristan Cacqueray
This is a class B3 type of bug (according to https://security.openstack.org/vmt-process.html#incident-report-taxonomy ) ** Changed in: ossa Status: Incomplete => Won't Fix -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to

[Yahoo-eng-team] [Bug 1528676] Re: OpenLDAP password policy not enforced for password changes

2016-01-04 Thread Tristan Cacqueray
Since this report concerns a possible security risk, an incomplete security advisory task has been added while the core security reviewers for the affected project or projects confirm the bug and discuss the scope of any vulnerability along with potential solutions. ** Also affects: ossa

[Yahoo-eng-team] [Bug 1526244] Re: Able to create objects by admin in the particular domain, for incorrect domain Id field name "domain-id".

2015-12-21 Thread Tristan Cacqueray
According to VMT taxonomy, this is a class E. ** Changed in: ossa Status: Incomplete => Won't Fix -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack Identity (keystone). https://bugs.launchpad.net/bugs/1526244

[Yahoo-eng-team] [Bug 1522524] Re: User can delete deactivated images

2015-12-15 Thread Tristan Cacqueray
Until a clear consensus about whenever this bug caused an actual security vulnerability, the OSSA task is now Won't Fix. ** Changed in: ossa Status: Confirmed => Won't Fix -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to

[Yahoo-eng-team] [Bug 1515444] Re: Routed ICMP v6 traffic goes through with no security group rules with DVR

2015-12-07 Thread Tristan Cacqueray
** Information type changed from Private Security to Public ** Changed in: ossa Status: Incomplete => Won't Fix -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to neutron. https://bugs.launchpad.net/bugs/1515444 Title:

[Yahoo-eng-team] [Bug 1449062] Re: qemu-img calls need to be restricted by ulimit (CVE-2015-5162)

2015-12-03 Thread Tristan Cacqueray
The proposed change did not effectively fixed that issue. ** Changed in: nova Status: Fix Released => Confirmed -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack Compute (nova).

[Yahoo-eng-team] [Bug 1516031] Re: Use of MD5 in OpenStack Glance image signature (CVE-2015-8234)

2015-11-23 Thread Tristan Cacqueray
Since this does not qualify for an OpenStack Security Advisory (OSSA), I've added an OSSN task to assess if a Security Note would work better here. ** Also affects: ossn Importance: Undecided Status: New ** Changed in: ossa Status: Incomplete => Won't Fix -- You received this

[Yahoo-eng-team] [Bug 1511061] Re: Images in inconsistent state when calls to registry fail during image deletion

2015-11-17 Thread Tristan Cacqueray
Thanks Erno, I've removed the OSSA task ** Changed in: ossa Status: Incomplete => Won't Fix -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to Glance. https://bugs.launchpad.net/bugs/1511061 Title: Images in inconsistent

[Yahoo-eng-team] [Bug 1501206] Re: router:dhcp ports are open resolvers

2015-11-17 Thread Tristan Cacqueray
Alright, removing the security class and closing the OSSA task. ** Changed in: ossa Status: Incomplete => Won't Fix ** Information type changed from Public Security to Public -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed

[Yahoo-eng-team] [Bug 1499555] Re: You can crash keystone or make the DB very slow by assigning many roles

2015-11-17 Thread Tristan Cacqueray
Then according to VMT taxonomy ( https://security.openstack.org/vmt- process.html#incident-report-taxonomy ), this sounds more like a class D. ** Changed in: ossa Status: Incomplete => Won't Fix -- You received this bug notification because you are a member of Yahoo! Engineering Team,

[Yahoo-eng-team] [Bug 1516031] [NEW] Use of MD5 in OpenStack Glance image signature

2015-11-13 Thread Tristan Cacqueray
*** This bug is a security vulnerability *** Public security bug reported: This have been reported by Daniel P. Berrange: " In the OpenStack Liberty release, the Glance project added support for image signature verification.

[Yahoo-eng-team] [Bug 1392527] Re: [OSSA 2015-017] Deleting instance while resize instance is running leads to unuseable compute nodes (CVE-2015-3280)

2015-10-07 Thread Tristan Cacqueray
** Changed in: ossa Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack Compute (nova). https://bugs.launchpad.net/bugs/1392527 Title: [OSSA 2015-017] Deleting instance while

[Yahoo-eng-team] [Bug 1491307] Re: [OSSA 2015-021] secgroup rules doesn't work for instance immediately (CVE-2015-7713)

2015-10-07 Thread Tristan Cacqueray
** Changed in: ossa Status: In Progress => Fix Released -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack Compute (nova). https://bugs.launchpad.net/bugs/1491307 Title: [OSSA 2015-021] secgroup rules doesn't work

[Yahoo-eng-team] [Bug 1498163] Re: [OSSA 2015-020] Glance storage quota bypass when token is expired (CVE-2015-5286)

2015-10-05 Thread Tristan Cacqueray
** Changed in: ossa Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to Glance. https://bugs.launchpad.net/bugs/1498163 Title: [OSSA 2015-020] Glance storage quota bypass when token is

[Yahoo-eng-team] [Bug 1482371] Re: [OSSA 2015-019] Image status can be changed by passing header 'x-image-meta-status' with PUT operation using v1 (CVE-2015-5251)

2015-09-23 Thread Tristan Cacqueray
** Changed in: ossa Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to Glance. https://bugs.launchpad.net/bugs/1482371 Title: [OSSA 2015-019] Image status can be changed by passing

[Yahoo-eng-team] [Bug 1489111] Re: [OSSA 2015-018] IP, MAC, and DHCP spoofing rules can by bypassed by changing device_owner (CVE-2015-5240)

2015-09-14 Thread Tristan Cacqueray
** Changed in: ossa Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to neutron. https://bugs.launchpad.net/bugs/1489111 Title: [OSSA 2015-018] IP, MAC, and DHCP spoofing rules can by

[Yahoo-eng-team] [Bug 1479385] Re: Cause conflicts within glance public metadefs

2015-09-08 Thread Tristan Cacqueray
Until this can be safely backported, the OSSA task is switched to Won't fix. ** Changed in: ossa Status: Triaged => Won't Fix ** Information type changed from Public Security to Public -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is

[Yahoo-eng-team] [Bug 1483382] Re: Able to request a V2 token for user and project in a non-default domain

2015-09-08 Thread Tristan Cacqueray
** Changed in: ossa Status: Incomplete => Won't Fix -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to Keystone. https://bugs.launchpad.net/bugs/1483382 Title: Able to request a V2 token for user and project in a

[Yahoo-eng-team] [Bug 1482301] Re: 'X-Openstack-Request-ID' lenght limited only by header size

2015-08-31 Thread Tristan Cacqueray
** Changed in: ossa Status: Incomplete => Won't Fix -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to Glance. https://bugs.launchpad.net/bugs/1482301 Title: 'X-Openstack-Request-ID' lenght limited only by header size

[Yahoo-eng-team] [Bug 1387543] Re: [OSSA 2015-015] Resize/delete combo allows to overload nova-compute (CVE-2015-3241)

2015-08-25 Thread Tristan Cacqueray
** Changed in: ossa Status: Fix Committed = Fix Released -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack Compute (nova). https://bugs.launchpad.net/bugs/1387543 Title: [OSSA 2015-015] Resize/delete combo allows

[Yahoo-eng-team] [Bug 1471912] Re: [OSSA 2015-014] Format-guessing and file disclosure via image conversion (CVE-2015-5163)

2015-08-14 Thread Tristan Cacqueray
** Changed in: ossa Status: Fix Committed = Fix Released -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to Glance. https://bugs.launchpad.net/bugs/1471912 Title: [OSSA 2015-014] Format-guessing and file disclosure via

[Yahoo-eng-team] [Bug 1415087] Re: [OSSA 2015-011] Format-guessing and file disclosure in image convert (CVE-2015-1850, CVE-2015-1851)

2015-08-10 Thread Tristan Cacqueray
The OSSA tasks is now closed. If Nova turns out to be affected, a new OSSA will be required anyway. ** Changed in: ossa Status: Fix Committed = Fix Released -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack Compute

[Yahoo-eng-team] [Bug 1482301] Re: 'X-Openstack-Request-ID' lenght limited only by header size

2015-08-06 Thread Tristan Cacqueray
** Also affects: ossa Importance: Undecided Status: New ** Changed in: ossa Status: New = Incomplete -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to Glance. https://bugs.launchpad.net/bugs/1482301 Title:

[Yahoo-eng-team] [Bug 1472243] [NEW] Router interface add port with a mac address raise runtime error

2015-07-07 Thread Tristan Cacqueray
Public bug reported: Trace: ERROR neutron.agent.l3.agent [-] Failed to process compatible router '1794ed9d-68d6-402c-a4e5-8041de4c4186' TRACE neutron.agent.l3.agent Traceback (most recent call last): TRACE neutron.agent.l3.agent File /usr/lib/python2.7/site-packages/neutron/agent/l3/agent.py,

[Yahoo-eng-team] [Bug 1472242] [NEW] Router interface add port without subnet raise indexerror

2015-07-07 Thread Tristan Cacqueray
Public bug reported: Trace: ERROR neutron.api.v2.resource [req-dbf179d1-62ac-4537-be15-c2088669f75c ] add_router_interface failed TRACE neutron.api.v2.resource Traceback (most recent call last): TRACE neutron.api.v2.resource File /usr/lib/python2.7/site-packages/neutron/api/v2/resource.py,

[Yahoo-eng-team] [Bug 1471966] [NEW] Invalid json types cause stacktrace

2015-07-06 Thread Tristan Cacqueray
Public bug reported: Incorrect json input cause error instead of being invalidated properly: Type error in dns_nameservers raise keyerror: ERROR neutron.api.v2.resource [req-be58f6e1-db2f-4b2e-9620-afb49bdd4552 demo d1da3f8632e3413b915eda78899806d7] create failed Traceback (most recent call

[Yahoo-eng-team] [Bug 1471957] [NEW] Invalid subnet cidr cause dhcp runtimerror

2015-07-06 Thread Tristan Cacqueray
Public bug reported: Trace: ERROR neutron.agent.linux.utils [req-26ce0148-4bc4-40bd-96ac-e9d484f37b61 demo 12b3399d1cb64da488e20f6a7c355d10] Command: ['sudo', '/usr/local/bin/neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ip', 'netns', 'exec', 'qdhcp-6cdefebf-ab88-4f55-b2b9-719286a7b75b',

[Yahoo-eng-team] [Bug 1471959] [NEW] Dhcp error in network with two subnet when one is disabled

2015-07-06 Thread Tristan Cacqueray
Public bug reported: Trace: ERROR neutron.agent.dhcp_agent [-] Unable to enable dhcp for 125c7403-1ef1-489c-bc0c-cf6a0f83e742. Traceback (most recent call last): File /opt/stack/neutron/neutron/agent/dhcp_agent.py, line 128, in call_driver getattr(driver, action)(**action_kwargs) File

[Yahoo-eng-team] [Bug 1461054] Re: [OSSA 2015-012] Adding 0.0.0.0/0 to allowed address pairs breaks l2 agent (CVE-2015-3221)

2015-07-02 Thread Tristan Cacqueray
** Changed in: ossa Status: Fix Committed = Fix Released -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to neutron. https://bugs.launchpad.net/bugs/1461054 Title: [OSSA 2015-012] Adding 0.0.0.0/0 to allowed address pairs

[Yahoo-eng-team] [Bug 1461728] Re: V2.0 API not calling defined external auth

2015-06-29 Thread Tristan Cacqueray
** Changed in: ossa Status: Incomplete = Won't Fix -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to Keystone. https://bugs.launchpad.net/bugs/1461728 Title: V2.0 API not calling defined external auth Status in OpenStack

[Yahoo-eng-team] [Bug 1464750] Re: Service accounts can be used to login horizon

2015-06-22 Thread Tristan Cacqueray
** Changed in: ossa Status: Incomplete = Won't Fix ** Information type changed from Private Security to Public ** Also affects: ossn Importance: Undecided Status: New ** Changed in: ossn Status: New = Incomplete -- You received this bug notification because you are a

[Yahoo-eng-team] [Bug 1461433] Re: Automatically generated admin password is not complex enough

2015-06-11 Thread Tristan Cacqueray
This is a class D type of bug ( https://security.openstack.org/vmt- process.html#incident-report-taxonomy ). ** Changed in: ossa Status: Incomplete = Won't Fix -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack

[Yahoo-eng-team] [Bug 1461431] Re: Enable admin password complexity verification

2015-06-11 Thread Tristan Cacqueray
Agreed on class D type of bug. ** Changed in: ossa Status: Incomplete = Won't Fix -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack Compute (nova). https://bugs.launchpad.net/bugs/1461431 Title: Enable admin

[Yahoo-eng-team] [Bug 1453074] Re: [OSSA 2015-010] help_text parameter of fields is vulnerable to arbitrary html injection (CVE-2015-3219)

2015-06-10 Thread Tristan Cacqueray
All patches are now merged, shouldn't series task be added to Horizon ? ** Changed in: ossa Status: Fix Committed = Fix Released -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack Dashboard (Horizon).

[Yahoo-eng-team] [Bug 1455582] Re: Hypervisor compromise may result in malicious trust creation

2015-06-08 Thread Tristan Cacqueray
** Also affects: ossn Importance: Undecided Status: New ** Changed in: ossa Status: Incomplete = Won't Fix -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to Keystone. https://bugs.launchpad.net/bugs/1455582 Title:

[Yahoo-eng-team] [Bug 1461095] Re: Token is not revoked when removing a user from project in Horizon

2015-06-05 Thread Tristan Cacqueray
Then it's an OSSA class E type of bug. ** Changed in: ossa Status: Incomplete = Won't Fix -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to Keystone. https://bugs.launchpad.net/bugs/1461095 Title: Token is not revoked

[Yahoo-eng-team] [Bug 1461095] Re: Token is not revoked when removing a user from project in Horizon

2015-06-03 Thread Tristan Cacqueray
** Also affects: ossa Importance: Undecided Status: New ** Changed in: ossa Status: New = Incomplete -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to Keystone. https://bugs.launchpad.net/bugs/1461095 Title:

[Yahoo-eng-team] [Bug 1449260] Re: [OSSA 2015-009] Sanitation of metadata label (CVE-2015-3988)

2015-06-01 Thread Tristan Cacqueray
** Summary changed: - Sanitation of metadata label (CVE-2015-3988) + [OSSA 2015-009] Sanitation of metadata label (CVE-2015-3988) ** Changed in: ossa Status: Fix Committed = Fix Released -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is

[Yahoo-eng-team] [Bug 1443598] Re: [OSSA 2015-008] backend_argument containing a password leaked in logs (CVE-2015-3646)

2015-05-27 Thread Tristan Cacqueray
** Changed in: ossa Status: Fix Committed = Fix Released -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to Keystone. https://bugs.launchpad.net/bugs/1443598 Title: [OSSA 2015-008] backend_argument containing a password

[Yahoo-eng-team] [Bug 1456228] Re: Trusted vm can be powered on untrusted host

2015-05-25 Thread Tristan Cacqueray
Since this report concerns a possible security risk, an incomplete security advisory task has been added while the core security reviewers for the affected project or projects confirm the bug and discuss the scope of any vulnerability along with potential solutions. Can a Nova core confirm that

[Yahoo-eng-team] [Bug 1429093] Re: nova allows to boot images with virtual size root_gb specified in flavor

2015-05-11 Thread Tristan Cacqueray
I've mark the OSSA task as won't fix as it's considered a vulnerability per se. ** Changed in: ossa Status: Incomplete = Won't Fix -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack Compute (nova).

[Yahoo-eng-team] [Bug 1435386] Re: Specific config setting may result in VMs being taken over through VNC

2015-04-06 Thread Tristan Cacqueray
** Changed in: ossa Status: Incomplete = Won't Fix -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack Compute (nova). https://bugs.launchpad.net/bugs/1435386 Title: Specific config setting may result in VMs being

[Yahoo-eng-team] [Bug 1435396] Re: No notifications for role grants using v2

2015-04-03 Thread Tristan Cacqueray
Since this report concerns a possible security risk, an incomplete security advisory task has been added while the core security reviewers for the affected project or projects confirm the bug and discuss the scope of any vulnerability along with potential solutions. ** Also affects: ossa

[Yahoo-eng-team] [Bug 1409142] Re: [OSSA 2015-005] Websocket Hijacking Vulnerability in Nova VNC Server (CVE-2015-0259)

2015-03-13 Thread Tristan Cacqueray
** Changed in: ossa Status: Fix Committed = Fix Released -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack Compute (nova). https://bugs.launchpad.net/bugs/1409142 Title: [OSSA 2015-005] Websocket Hijacking

[Yahoo-eng-team] [Bug 1427533] Re: keystone logs password in log message

2015-03-03 Thread Tristan Cacqueray
Thanks Brant for the quick feedback! I opened the bug since it only concerns master, can you please confirm the keystone part and tag it for kilo in order to have it fixed before the release ? ** Information type changed from Private Security to Public Security ** Changed in: ossa

[Yahoo-eng-team] [Bug 1420696] Re: [OSSA 2015-004] Image data remains in backend after deleting the image created using task api (import-from) (CVE-2015-1881)

2015-02-23 Thread Tristan Cacqueray
** Changed in: ossa Status: In Progress = Fix Released -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to Glance. https://bugs.launchpad.net/bugs/1420696 Title: [OSSA 2015-004] Image data remains in backend after deleting

[Yahoo-eng-team] [Bug 1371118] Re: [OSSA 2015-004] Image file stays in store if image has been deleted during upload (CVE-2014-9684)

2015-02-23 Thread Tristan Cacqueray
** Changed in: ossa Status: Fix Committed = Fix Released -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to Glance. https://bugs.launchpad.net/bugs/1371118 Title: [OSSA 2015-004] Image file stays in store if image has been

[Yahoo-eng-team] [Bug 1418855] Re: Instance files doesn't clean up from destination node in revert-resize api for non-shared environment

2015-02-09 Thread Tristan Cacqueray
This bug is not affecting a released version, let's open it. Feel free to send patch directly to gerrit now. ** Information type changed from Private Security to Public Security ** Changed in: ossa Status: Incomplete = Won't Fix -- You received this bug notification because you are a

[Yahoo-eng-team] [Bug 1412501] Re: libvirt driver uses a set of ssh commands for communication with other nodes

2015-01-26 Thread Tristan Cacqueray
class D confirmed, setting the OSSA task as won't fix. ** Changed in: ossa Status: Incomplete = Won't Fix ** Changed in: ossa Assignee: Marian Horban (mhorban) = (unassigned) -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is

[Yahoo-eng-team] [Bug 1398830] Re: [OSSA 2015-003] Glance image leak when in saving state (CVE-2014-9623)

2015-01-26 Thread Tristan Cacqueray
** Changed in: ossa Status: Fix Committed = Fix Released -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to Glance. https://bugs.launchpad.net/bugs/1398830 Title: [OSSA 2015-003] Glance image leak when in saving state

[Yahoo-eng-team] [Bug 1414529] Re: eval being used in session.py

2015-01-26 Thread Tristan Cacqueray
** Changed in: ossa Status: Incomplete = Won't Fix -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack Compute (nova). https://bugs.launchpad.net/bugs/1414529 Title: eval being used in session.py Status in

[Yahoo-eng-team] [Bug 1408663] Re: [OSSA-2015-002] Glance still allows users to download and delete any file in glance-api server (CVE-2015-1195)

2015-01-20 Thread Tristan Cacqueray
** Changed in: ossa Status: In Progress = Fix Released -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to Glance. https://bugs.launchpad.net/bugs/1408663 Title: [OSSA-2015-002] Glance still allows users to download and

  1   2   >