ALT-BU-2016-3093-2
Branch sisyphus update bulletin.
Closed vulnerabilities
Modified: 2025-04-12
CVE-2016-3492
Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier, 5.6.32 and earlier, and 5.7.14 and earlier allows remote authenticated users to affect availability via vectors related to Server: Optimizer.
- http://rhn.redhat.com/errata/RHSA-2016-2130.html
- http://rhn.redhat.com/errata/RHSA-2016-2131.html
- http://rhn.redhat.com/errata/RHSA-2016-2595.html
- http://rhn.redhat.com/errata/RHSA-2016-2749.html
- http://rhn.redhat.com/errata/RHSA-2016-2927.html
- http://rhn.redhat.com/errata/RHSA-2016-2928.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.securityfocus.com/bid/93650
- http://www.securitytracker.com/id/1037050
- https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
- https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
- https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
- https://security.gentoo.org/glsa/201701-01
- http://rhn.redhat.com/errata/RHSA-2016-2130.html
- http://rhn.redhat.com/errata/RHSA-2016-2131.html
- http://rhn.redhat.com/errata/RHSA-2016-2595.html
- http://rhn.redhat.com/errata/RHSA-2016-2749.html
- http://rhn.redhat.com/errata/RHSA-2016-2927.html
- http://rhn.redhat.com/errata/RHSA-2016-2928.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.securityfocus.com/bid/93650
- http://www.securitytracker.com/id/1037050
- https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
- https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
- https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
- https://security.gentoo.org/glsa/201701-01
Modified: 2023-11-07
CVE-2016-5616
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2016-6663. Reason: This candidate is a reservation duplicate of CVE-2016-6663. Notes: All CVE users should reference CVE-2016-6663 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage
Modified: 2025-04-12
CVE-2016-5624
Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier allows remote authenticated users to affect availability via vectors related to DML.
- http://rhn.redhat.com/errata/RHSA-2016-2130.html
- http://rhn.redhat.com/errata/RHSA-2016-2131.html
- http://rhn.redhat.com/errata/RHSA-2016-2595.html
- http://rhn.redhat.com/errata/RHSA-2016-2927.html
- http://rhn.redhat.com/errata/RHSA-2016-2928.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.securityfocus.com/bid/93635
- http://www.securitytracker.com/id/1037050
- https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
- https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
- https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
- http://rhn.redhat.com/errata/RHSA-2016-2130.html
- http://rhn.redhat.com/errata/RHSA-2016-2131.html
- http://rhn.redhat.com/errata/RHSA-2016-2595.html
- http://rhn.redhat.com/errata/RHSA-2016-2927.html
- http://rhn.redhat.com/errata/RHSA-2016-2928.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.securityfocus.com/bid/93635
- http://www.securitytracker.com/id/1037050
- https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
- https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
- https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
Modified: 2025-04-12
CVE-2016-5626
Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier, 5.6.32 and earlier, and 5.7.14 and earlier allows remote authenticated users to affect availability via vectors related to GIS.
- http://rhn.redhat.com/errata/RHSA-2016-2130.html
- http://rhn.redhat.com/errata/RHSA-2016-2131.html
- http://rhn.redhat.com/errata/RHSA-2016-2595.html
- http://rhn.redhat.com/errata/RHSA-2016-2749.html
- http://rhn.redhat.com/errata/RHSA-2016-2927.html
- http://rhn.redhat.com/errata/RHSA-2016-2928.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.securityfocus.com/bid/93638
- http://www.securitytracker.com/id/1037050
- https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
- https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
- https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
- https://security.gentoo.org/glsa/201701-01
- http://rhn.redhat.com/errata/RHSA-2016-2130.html
- http://rhn.redhat.com/errata/RHSA-2016-2131.html
- http://rhn.redhat.com/errata/RHSA-2016-2595.html
- http://rhn.redhat.com/errata/RHSA-2016-2749.html
- http://rhn.redhat.com/errata/RHSA-2016-2927.html
- http://rhn.redhat.com/errata/RHSA-2016-2928.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.securityfocus.com/bid/93638
- http://www.securitytracker.com/id/1037050
- https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
- https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
- https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
- https://security.gentoo.org/glsa/201701-01
Modified: 2025-04-12
CVE-2016-5629
Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier, 5.6.32 and earlier, and 5.7.14 and earlier allows remote administrators to affect availability via vectors related to Server: Federated.
- http://rhn.redhat.com/errata/RHSA-2016-2130.html
- http://rhn.redhat.com/errata/RHSA-2016-2131.html
- http://rhn.redhat.com/errata/RHSA-2016-2595.html
- http://rhn.redhat.com/errata/RHSA-2016-2749.html
- http://rhn.redhat.com/errata/RHSA-2016-2927.html
- http://rhn.redhat.com/errata/RHSA-2016-2928.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.securityfocus.com/bid/93668
- http://www.securitytracker.com/id/1037050
- https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
- https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
- https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
- https://security.gentoo.org/glsa/201701-01
- http://rhn.redhat.com/errata/RHSA-2016-2130.html
- http://rhn.redhat.com/errata/RHSA-2016-2131.html
- http://rhn.redhat.com/errata/RHSA-2016-2595.html
- http://rhn.redhat.com/errata/RHSA-2016-2749.html
- http://rhn.redhat.com/errata/RHSA-2016-2927.html
- http://rhn.redhat.com/errata/RHSA-2016-2928.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.securityfocus.com/bid/93668
- http://www.securitytracker.com/id/1037050
- https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
- https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
- https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
- https://security.gentoo.org/glsa/201701-01
Modified: 2025-04-12
CVE-2016-6663
Race condition in Oracle MySQL before 5.5.52, 5.6.x before 5.6.33, 5.7.x before 5.7.15, and 8.x before 8.0.1; MariaDB before 5.5.52, 10.0.x before 10.0.28, and 10.1.x before 10.1.18; Percona Server before 5.5.51-38.2, 5.6.x before 5.6.32-78-1, and 5.7.x before 5.7.14-8; and Percona XtraDB Cluster before 5.5.41-37.0, 5.6.x before 5.6.32-25.17, and 5.7.x before 5.7.14-26.17 allows local users with certain permissions to gain privileges by leveraging use of my_copystat by REPAIR TABLE to repair a MyISAM table.
- http://rhn.redhat.com/errata/RHSA-2016-2130.html
- http://rhn.redhat.com/errata/RHSA-2016-2131.html
- http://rhn.redhat.com/errata/RHSA-2016-2595.html
- http://rhn.redhat.com/errata/RHSA-2016-2749.html
- http://rhn.redhat.com/errata/RHSA-2016-2927.html
- http://rhn.redhat.com/errata/RHSA-2016-2928.html
- http://rhn.redhat.com/errata/RHSA-2017-0184.html
- http://seclists.org/fulldisclosure/2016/Nov/4
- http://www.openwall.com/lists/oss-security/2016/10/25/4
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.securityfocus.com/bid/92911
- http://www.securityfocus.com/bid/93614
- https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-52.html
- https://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-33.html
- https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-15.html
- https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-1.html
- https://github.com/MariaDB/server/commit/347eeefbfc658c8531878218487d729f4e020805
- https://github.com/mysql/mysql-server/commit/4e5473862e6852b0f3802b0cd0c6fa10b5253291
- https://legalhackers.com/advisories/MySQL-Maria-Percona-PrivEscRace-CVE-2016-6663-5616-Exploit.html
- https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
- https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
- https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
- https://www.exploit-db.com/exploits/40678/
- https://www.percona.com/blog/2016/11/02/percona-responds-to-cve-2016-6663-and-cve-2016-6664/
- http://rhn.redhat.com/errata/RHSA-2016-2130.html
- http://rhn.redhat.com/errata/RHSA-2016-2131.html
- http://rhn.redhat.com/errata/RHSA-2016-2595.html
- http://rhn.redhat.com/errata/RHSA-2016-2749.html
- http://rhn.redhat.com/errata/RHSA-2016-2927.html
- http://rhn.redhat.com/errata/RHSA-2016-2928.html
- http://rhn.redhat.com/errata/RHSA-2017-0184.html
- http://seclists.org/fulldisclosure/2016/Nov/4
- http://www.openwall.com/lists/oss-security/2016/10/25/4
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.securityfocus.com/bid/92911
- http://www.securityfocus.com/bid/93614
- https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-52.html
- https://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-33.html
- https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-15.html
- https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-1.html
- https://github.com/MariaDB/server/commit/347eeefbfc658c8531878218487d729f4e020805
- https://github.com/mysql/mysql-server/commit/4e5473862e6852b0f3802b0cd0c6fa10b5253291
- https://legalhackers.com/advisories/MySQL-Maria-Percona-PrivEscRace-CVE-2016-6663-5616-Exploit.html
- https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
- https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
- https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
- https://www.exploit-db.com/exploits/40678/
- https://www.percona.com/blog/2016/11/02/percona-responds-to-cve-2016-6663-and-cve-2016-6664/
Modified: 2025-04-12
CVE-2016-8283
Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier, 5.6.32 and earlier, and 5.7.14 and earlier allows remote authenticated users to affect availability via vectors related to Server: Types.
- http://rhn.redhat.com/errata/RHSA-2016-2130.html
- http://rhn.redhat.com/errata/RHSA-2016-2131.html
- http://rhn.redhat.com/errata/RHSA-2016-2595.html
- http://rhn.redhat.com/errata/RHSA-2016-2749.html
- http://rhn.redhat.com/errata/RHSA-2016-2927.html
- http://rhn.redhat.com/errata/RHSA-2016-2928.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.securityfocus.com/bid/93737
- http://www.securitytracker.com/id/1037050
- https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
- https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
- https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
- https://security.gentoo.org/glsa/201701-01
- http://rhn.redhat.com/errata/RHSA-2016-2130.html
- http://rhn.redhat.com/errata/RHSA-2016-2131.html
- http://rhn.redhat.com/errata/RHSA-2016-2595.html
- http://rhn.redhat.com/errata/RHSA-2016-2749.html
- http://rhn.redhat.com/errata/RHSA-2016-2927.html
- http://rhn.redhat.com/errata/RHSA-2016-2928.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.securityfocus.com/bid/93737
- http://www.securitytracker.com/id/1037050
- https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
- https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
- https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
- https://security.gentoo.org/glsa/201701-01
Closed bugs
Не стартует после установки
Package apache2-mod_apreq updated to version 2.13-alt6 for branch sisyphus in task 171378.
Closed bugs
Cannot load modules/mod_apreq2.so into server: /etc/httpd2/modules/mod_apreq2.so: undefined symbol: ap_log_rerror
Package openstack-nova updated to version 14.0.1-alt1 for branch sisyphus in task 170964.
Closed vulnerabilities
Modified: 2025-04-12
CVE-2015-5162
The image parser in OpenStack Cinder 7.0.2 and 8.0.0 through 8.1.1; Glance before 11.0.1 and 12.0.0; and Nova before 12.0.4 and 13.0.0 does not properly limit qemu-img calls, which might allow attackers to cause a denial of service (memory and disk consumption) via a crafted disk image.
- http://rhn.redhat.com/errata/RHSA-2016-2923.html
- http://rhn.redhat.com/errata/RHSA-2016-2991.html
- http://rhn.redhat.com/errata/RHSA-2017-0153.html
- http://rhn.redhat.com/errata/RHSA-2017-0156.html
- http://rhn.redhat.com/errata/RHSA-2017-0165.html
- http://rhn.redhat.com/errata/RHSA-2017-0282.html
- http://www.openwall.com/lists/oss-security/2016/10/06/8
- http://www.securityfocus.com/bid/76849
- https://launchpad.net/bugs/1449062
- http://rhn.redhat.com/errata/RHSA-2016-2923.html
- http://rhn.redhat.com/errata/RHSA-2016-2991.html
- http://rhn.redhat.com/errata/RHSA-2017-0153.html
- http://rhn.redhat.com/errata/RHSA-2017-0156.html
- http://rhn.redhat.com/errata/RHSA-2017-0165.html
- http://rhn.redhat.com/errata/RHSA-2017-0282.html
- http://www.openwall.com/lists/oss-security/2016/10/06/8
- http://www.securityfocus.com/bid/76849
- https://launchpad.net/bugs/1449062
Modified: 2023-02-04
GHSA-g2j5-7vgx-6xrx
OpenStack Cinder, Glance, and Nova contain Uncontrolled Resource Consumption
- https://nvd.nist.gov/vuln/detail/CVE-2015-5162
- https://github.com/openstack/cinder/commit/455b318ced717fb38dfe40014817d78fbc47dea5
- https://github.com/openstack/glance/commit/69a9b659fd48aa3c1f84fc7bc9ae236b6803d31f
- https://github.com/openstack/nova/commit/6bc37dcceca823998068167b49aec6def3112397
- https://access.redhat.com/security/cve/CVE-2015-5162
- https://bugzilla.redhat.com/show_bug.cgi?id=1268303
- https://launchpad.net/bugs/1449062
- http://rhn.redhat.com/errata/RHSA-2016-2923.html
- http://rhn.redhat.com/errata/RHSA-2016-2991.html
- http://rhn.redhat.com/errata/RHSA-2017-0153.html
- http://rhn.redhat.com/errata/RHSA-2017-0156.html
- http://rhn.redhat.com/errata/RHSA-2017-0165.html
- http://rhn.redhat.com/errata/RHSA-2017-0282.html
- http://www.openwall.com/lists/oss-security/2016/10/06/8
- http://www.securityfocus.com/bid/76849
Package openstack-glance updated to version 13.0.0-alt1 for branch sisyphus in task 170964.
Closed vulnerabilities
Modified: 2025-04-12
CVE-2015-5162
The image parser in OpenStack Cinder 7.0.2 and 8.0.0 through 8.1.1; Glance before 11.0.1 and 12.0.0; and Nova before 12.0.4 and 13.0.0 does not properly limit qemu-img calls, which might allow attackers to cause a denial of service (memory and disk consumption) via a crafted disk image.
- http://rhn.redhat.com/errata/RHSA-2016-2923.html
- http://rhn.redhat.com/errata/RHSA-2016-2991.html
- http://rhn.redhat.com/errata/RHSA-2017-0153.html
- http://rhn.redhat.com/errata/RHSA-2017-0156.html
- http://rhn.redhat.com/errata/RHSA-2017-0165.html
- http://rhn.redhat.com/errata/RHSA-2017-0282.html
- http://www.openwall.com/lists/oss-security/2016/10/06/8
- http://www.securityfocus.com/bid/76849
- https://launchpad.net/bugs/1449062
- http://rhn.redhat.com/errata/RHSA-2016-2923.html
- http://rhn.redhat.com/errata/RHSA-2016-2991.html
- http://rhn.redhat.com/errata/RHSA-2017-0153.html
- http://rhn.redhat.com/errata/RHSA-2017-0156.html
- http://rhn.redhat.com/errata/RHSA-2017-0165.html
- http://rhn.redhat.com/errata/RHSA-2017-0282.html
- http://www.openwall.com/lists/oss-security/2016/10/06/8
- http://www.securityfocus.com/bid/76849
- https://launchpad.net/bugs/1449062
Modified: 2023-02-04
GHSA-g2j5-7vgx-6xrx
OpenStack Cinder, Glance, and Nova contain Uncontrolled Resource Consumption
- https://nvd.nist.gov/vuln/detail/CVE-2015-5162
- https://github.com/openstack/cinder/commit/455b318ced717fb38dfe40014817d78fbc47dea5
- https://github.com/openstack/glance/commit/69a9b659fd48aa3c1f84fc7bc9ae236b6803d31f
- https://github.com/openstack/nova/commit/6bc37dcceca823998068167b49aec6def3112397
- https://access.redhat.com/security/cve/CVE-2015-5162
- https://bugzilla.redhat.com/show_bug.cgi?id=1268303
- https://launchpad.net/bugs/1449062
- http://rhn.redhat.com/errata/RHSA-2016-2923.html
- http://rhn.redhat.com/errata/RHSA-2016-2991.html
- http://rhn.redhat.com/errata/RHSA-2017-0153.html
- http://rhn.redhat.com/errata/RHSA-2017-0156.html
- http://rhn.redhat.com/errata/RHSA-2017-0165.html
- http://rhn.redhat.com/errata/RHSA-2017-0282.html
- http://www.openwall.com/lists/oss-security/2016/10/06/8
- http://www.securityfocus.com/bid/76849
Package openstack-cinder updated to version 9.0.0-alt1 for branch sisyphus in task 170964.
Closed vulnerabilities
Modified: 2025-04-12
CVE-2015-5162
The image parser in OpenStack Cinder 7.0.2 and 8.0.0 through 8.1.1; Glance before 11.0.1 and 12.0.0; and Nova before 12.0.4 and 13.0.0 does not properly limit qemu-img calls, which might allow attackers to cause a denial of service (memory and disk consumption) via a crafted disk image.
- http://rhn.redhat.com/errata/RHSA-2016-2923.html
- http://rhn.redhat.com/errata/RHSA-2016-2991.html
- http://rhn.redhat.com/errata/RHSA-2017-0153.html
- http://rhn.redhat.com/errata/RHSA-2017-0156.html
- http://rhn.redhat.com/errata/RHSA-2017-0165.html
- http://rhn.redhat.com/errata/RHSA-2017-0282.html
- http://www.openwall.com/lists/oss-security/2016/10/06/8
- http://www.securityfocus.com/bid/76849
- https://launchpad.net/bugs/1449062
- http://rhn.redhat.com/errata/RHSA-2016-2923.html
- http://rhn.redhat.com/errata/RHSA-2016-2991.html
- http://rhn.redhat.com/errata/RHSA-2017-0153.html
- http://rhn.redhat.com/errata/RHSA-2017-0156.html
- http://rhn.redhat.com/errata/RHSA-2017-0165.html
- http://rhn.redhat.com/errata/RHSA-2017-0282.html
- http://www.openwall.com/lists/oss-security/2016/10/06/8
- http://www.securityfocus.com/bid/76849
- https://launchpad.net/bugs/1449062
Modified: 2023-02-04
GHSA-g2j5-7vgx-6xrx
OpenStack Cinder, Glance, and Nova contain Uncontrolled Resource Consumption
- https://nvd.nist.gov/vuln/detail/CVE-2015-5162
- https://github.com/openstack/cinder/commit/455b318ced717fb38dfe40014817d78fbc47dea5
- https://github.com/openstack/glance/commit/69a9b659fd48aa3c1f84fc7bc9ae236b6803d31f
- https://github.com/openstack/nova/commit/6bc37dcceca823998068167b49aec6def3112397
- https://access.redhat.com/security/cve/CVE-2015-5162
- https://bugzilla.redhat.com/show_bug.cgi?id=1268303
- https://launchpad.net/bugs/1449062
- http://rhn.redhat.com/errata/RHSA-2016-2923.html
- http://rhn.redhat.com/errata/RHSA-2016-2991.html
- http://rhn.redhat.com/errata/RHSA-2017-0153.html
- http://rhn.redhat.com/errata/RHSA-2017-0156.html
- http://rhn.redhat.com/errata/RHSA-2017-0165.html
- http://rhn.redhat.com/errata/RHSA-2017-0282.html
- http://www.openwall.com/lists/oss-security/2016/10/06/8
- http://www.securityfocus.com/bid/76849
Package openstack-neutron updated to version 9.0.0-alt1 for branch sisyphus in task 170964.
Closed vulnerabilities
Modified: 2025-04-12
CVE-2015-8914
The IPTables firewall in OpenStack Neutron before 7.0.4 and 8.0.0 through 8.1.0 allows remote attackers to bypass an intended ICMPv6-spoofing protection mechanism and consequently cause a denial of service or intercept network traffic via a link-local source address.
- http://www.openwall.com/lists/oss-security/2016/06/10/5
- http://www.openwall.com/lists/oss-security/2016/06/10/6
- https://access.redhat.com/errata/RHSA-2016:1473
- https://access.redhat.com/errata/RHSA-2016:1474
- https://bugs.launchpad.net/neutron/+bug/1502933
- https://review.openstack.org/#/c/300233/
- https://review.openstack.org/#/c/310648/
- https://review.openstack.org/#/c/310652/
- https://security.openstack.org/ossa/OSSA-2016-009.html
- http://www.openwall.com/lists/oss-security/2016/06/10/5
- http://www.openwall.com/lists/oss-security/2016/06/10/6
- https://access.redhat.com/errata/RHSA-2016:1473
- https://access.redhat.com/errata/RHSA-2016:1474
- https://bugs.launchpad.net/neutron/+bug/1502933
- https://review.openstack.org/#/c/300233/
- https://review.openstack.org/#/c/310648/
- https://review.openstack.org/#/c/310652/
- https://security.openstack.org/ossa/OSSA-2016-009.html
Modified: 2025-04-12
CVE-2016-5362
The IPTables firewall in OpenStack Neutron before 7.0.4 and 8.0.0 through 8.1.0 allows remote attackers to bypass an intended DHCP-spoofing protection mechanism and consequently cause a denial of service or intercept network traffic via a crafted DHCP discovery message.
- http://www.openwall.com/lists/oss-security/2016/06/10/5
- http://www.openwall.com/lists/oss-security/2016/06/10/6
- https://access.redhat.com/errata/RHSA-2016:1473
- https://access.redhat.com/errata/RHSA-2016:1474
- https://bugs.launchpad.net/neutron/+bug/1558658
- https://review.openstack.org/#/c/300202/
- https://review.openstack.org/#/c/303563/
- https://review.openstack.org/#/c/303572/
- https://security.openstack.org/ossa/OSSA-2016-009.html
- http://www.openwall.com/lists/oss-security/2016/06/10/5
- http://www.openwall.com/lists/oss-security/2016/06/10/6
- https://access.redhat.com/errata/RHSA-2016:1473
- https://access.redhat.com/errata/RHSA-2016:1474
- https://bugs.launchpad.net/neutron/+bug/1558658
- https://review.openstack.org/#/c/300202/
- https://review.openstack.org/#/c/303563/
- https://review.openstack.org/#/c/303572/
- https://security.openstack.org/ossa/OSSA-2016-009.html
Modified: 2025-04-12
CVE-2016-5363
The IPTables firewall in OpenStack Neutron before 7.0.4 and 8.0.0 through 8.1.0 allows remote attackers to bypass an intended MAC-spoofing protection mechanism and consequently cause a denial of service or intercept network traffic via (1) a crafted DHCP discovery message or (2) crafted non-IP traffic.
- http://www.openwall.com/lists/oss-security/2016/06/10/5
- http://www.openwall.com/lists/oss-security/2016/06/10/6
- https://access.redhat.com/errata/RHSA-2016:1473
- https://access.redhat.com/errata/RHSA-2016:1474
- https://bugs.launchpad.net/neutron/+bug/1558658
- https://review.openstack.org/#/c/299021/
- https://review.openstack.org/#/c/299023/
- https://review.openstack.org/#/c/299025/
- https://security.openstack.org/ossa/OSSA-2016-009.html
- http://www.openwall.com/lists/oss-security/2016/06/10/5
- http://www.openwall.com/lists/oss-security/2016/06/10/6
- https://access.redhat.com/errata/RHSA-2016:1473
- https://access.redhat.com/errata/RHSA-2016:1474
- https://bugs.launchpad.net/neutron/+bug/1558658
- https://review.openstack.org/#/c/299021/
- https://review.openstack.org/#/c/299023/
- https://review.openstack.org/#/c/299025/
- https://security.openstack.org/ossa/OSSA-2016-009.html
Modified: 2025-04-15
GHSA-3vj4-cvjp-482h
OpenStack Neutron allows remote attackers to bypass an intended ICMPv6-spoofing protection mechanism
- https://nvd.nist.gov/vuln/detail/CVE-2015-8914
- https://access.redhat.com/errata/RHSA-2016:1473
- https://access.redhat.com/errata/RHSA-2016:1474
- https://bugs.launchpad.net/neutron/+bug/1502933
- https://github.com/openstack/neutron
- https://review.openstack.org/#/c/300233
- https://review.openstack.org/#/c/310648
- https://review.openstack.org/#/c/310652
- https://security.openstack.org/ossa/OSSA-2016-009.html
- http://www.openwall.com/lists/oss-security/2016/06/10/5
- http://www.openwall.com/lists/oss-security/2016/06/10/6
Modified: 2024-05-15
GHSA-9pp3-cvmq-9p22
OpenStack Neutron Intended MAC-spoofing protection mechanism bypass
- https://nvd.nist.gov/vuln/detail/CVE-2016-5363
- https://github.com/openstack/neutron/commit/5853af9cba6733725d6c9ac0db644f426713f0cf
- https://github.com/openstack/neutron/commit/6a93ee8ac1a901c255e3475a24f1afc11d8bf80f
- https://github.com/openstack/neutron/commit/997d7b03fb7f5528f0a3ce70867b9dcd9321509e
- https://github.com/openstack/neutron/commit/fd5fd259a02156babdfcb12f66cde6ec9e7274ae
- https://access.redhat.com/errata/RHSA-2016:1473
- https://access.redhat.com/errata/RHSA-2016:1474
- https://bugs.launchpad.net/neutron/+bug/1558658
- https://github.com/openstack/neutron
- https://review.openstack.org/#/c/299021
- https://review.openstack.org/#/c/299023
- https://review.openstack.org/#/c/299025
- https://security.openstack.org/ossa/OSSA-2016-009.html
- http://www.openwall.com/lists/oss-security/2016/06/10/5
- http://www.openwall.com/lists/oss-security/2016/06/10/6
Modified: 2025-04-15
GHSA-qpwc-p365-pqrr
OpenStack Neutron allows remote attackers to bypass an intended DHCP-spoofing protection mechanism
- https://nvd.nist.gov/vuln/detail/CVE-2016-5362
- https://access.redhat.com/errata/RHSA-2016:1473
- https://access.redhat.com/errata/RHSA-2016:1474
- https://bugs.launchpad.net/neutron/+bug/1558658
- https://github.com/openstack/neutron
- https://review.openstack.org/#/c/300202
- https://review.openstack.org/#/c/303563
- https://review.openstack.org/#/c/303572
- https://security.openstack.org/ossa/OSSA-2016-009.html
- http://www.openwall.com/lists/oss-security/2016/06/10/5
- http://www.openwall.com/lists/oss-security/2016/06/10/6
