Bug 836658 (CVE-2012-3371)
| Summary: | CVE-2012-3371 OpenStack-Nova: Scheduler denial of service through scheduler_hints | ||||||||
|---|---|---|---|---|---|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | Kurt Seifried <kseifried> | ||||||
| Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> | ||||||
| Status: | CLOSED ERRATA | QA Contact: | |||||||
| Severity: | low | Docs Contact: | |||||||
| Priority: | low | ||||||||
| Version: | unspecified | CC: | apevec, jrusnack, kseifried, markmc, pbrady, rbryant, rkukura, security-response-team | ||||||
| Target Milestone: | --- | Keywords: | Security | ||||||
| Target Release: | --- | ||||||||
| Hardware: | All | ||||||||
| OS: | Linux | ||||||||
| Whiteboard: | |||||||||
| Fixed In Version: | Doc Type: | Bug Fix | |||||||
| Doc Text: | Story Points: | --- | |||||||
| Clone Of: | Environment: | ||||||||
| Last Closed: | 2012-09-12 19:07:03 UTC | Type: | --- | ||||||
| Regression: | --- | Mount Type: | --- | ||||||
| Documentation: | --- | CRM: | |||||||
| Verified Versions: | Category: | --- | |||||||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||||
| Cloudforms Team: | --- | Target Upstream Version: | |||||||
| Embargoed: | |||||||||
| Bug Depends On: | 839407, 844041 | ||||||||
| Bug Blocks: | |||||||||
| Attachments: |
|
||||||||
|
Description
Kurt Seifried
2012-06-29 20:41:06 UTC
Created attachment 596162 [details]
Upstream patch for Essex
Created attachment 596163 [details]
Upstream patch for Folsom
Created openstack-nova tracking bugs for this issue Affects: fedora-all [bug 839407] References: http://thread.gmane.org/gmane.comp.security.oss.general/7988 https://lists.launchpad.net/openstack/msg14452.html Upstream bug: https://bugs.launchpad.net/nova/+bug/1017795 Upstream commits: Folsom: https://github.com/openstack/nova/commit/034762e8060dcf0a11cb039b9d426b0d0bb1801d Essex: https://github.com/openstack/nova/commit/25f5bd31805bd21d7b7e3583c775252aa8f737e9 Created openstack-nova tracking bugs for this issue Affects: epel-6 [bug 844041] |