Lucene search

K
redhatRedHatRHSA-2015:1679
HistoryAug 24, 2015 - 12:00 a.m.

(RHSA-2015:1679) Moderate: python-django-horizon security and bug fix update

2015-08-2400:00:00
access.redhat.com
9

0.003 Low

EPSS

Percentile

69.6%

OpenStack Dashboard (Horizon) provides administrators and users with a
graphical interface to access, provision, and automate cloud-based
resources.

Two security issues were discovered in the Horizon dashboard and are
addressed in this update:

  • A cross-site scripting (XSS) flaw was found in the Horizon Orchestration
    dashboard. An attacker able to trick a Horizon user into using a malicious
    template during the stack creation could use this flaw to perform an XSS
    attack on that user. (CVE-2015-3219)

Red Hat would like to thank the OpenStack Project for reporting the
CVE-2015-3219 issue. Upstream acknowledges Nikita Konovalov from Mirantis
as the original reporter of CVE-2015-3219.

  • A flaw was discovered in the Horizon metadata dashboard whereby
    potentially untrusted data was displayed from Glance images, Nova flavors,
    or host aggregates without correct clean up. An attacker could use this
    flaw to conduct an XSS attack.(CVE-2015-3988)

Additionally, the following non-security issues are addressed:

  • It was impossible to associate a floating IP address to a port for an
    instance. This occurred if the gateway router was not in the same tenant as
    the instance but was attached to a network shared across tenants because
    only ports within the tenant were used to find reachable gateway routers.
    (BZ#1187992)

  • If two or more regions were configured in Horizon, then the User, Help,
    and Current Project links would no longer work and the region selector
    was in the wrong location in the UI. (BZ#1189887)

  • A load balancer monitor was erroneously displayed as associated with
    every tenant in every pool. The load balancer monitor was not actually
    associated with any tenants, but the improper display prevented users
    from using the Horizon dashboard to create a tenant association.
    (BZ#1196249)

  • When logging into the Horizon dashboard, Horizon sends a query to Nova to
    update usage statistics. One of the calls would erroneously query deleted
    virtual machines; if there were thousands of deleted virtual machines, the
    CPU usage for Nova would spike and the Nova process could crash.
    (BZ#1243301)

  • The network profile was not supported by Cisco N1KV ML2 drivers. This
    profile has been removed to maintain Horizon compatibility with the Cisco
    driver. (BZ#1246690)

  • A neutron attribute extension was renamed from profile_id to profile for
    networks and ports. This caused create operations for networks and ports to
    fail from the dashboard since the dashboard was still using the attribute
    name n1kv:profile_id rather than n1kv:profile.(BZ#1248367)

  • If a virtual machine instance failed to launch, then the stale port
    assignments were left in the configuration rather than being cleaned up.
    (BZ#1249228)

All python-django-horizon users are advised to upgrade to these updated
packages, which correct these issues.