CVE-2013-6491

Priority
Medium
Description
The python-qpid client (common/rpc/impl_qpid.py) in OpenStack Oslo before
2013.2 does not enforce SSL connections when qpid_protocol is set to ssl,
which allows remote attackers to obtain sensitive information by sniffing
the network.
References
Bugs
Assigned-to
jdstrand
Package
Upstream:not-affected
Ubuntu 10.04 LTS (Lucid Lynx):DNE
Ubuntu 12.04 LTS (Precise Pangolin):not-affected
Ubuntu 13.10 (Saucy Salamander):DNE
Ubuntu 14.04 LTS (Trusty Tahr):DNE
Ubuntu 14.10 (Utopic Unicorn):DNE
Package
Upstream:not-affected
Ubuntu 10.04 LTS (Lucid Lynx):DNE
Ubuntu 12.04 LTS (Precise Pangolin):DNE
Ubuntu 13.10 (Saucy Salamander):not-affected
Ubuntu 14.04 LTS (Trusty Tahr):not-affected
Ubuntu 14.10 (Utopic Unicorn):not-affected
Package
Upstream:not-affected
Ubuntu 10.04 LTS (Lucid Lynx):DNE
Ubuntu 12.04 LTS (Precise Pangolin):not-affected (code not present)
Ubuntu 13.10 (Saucy Salamander):not-affected
Ubuntu 14.04 LTS (Trusty Tahr):not-affected (code not present)
Ubuntu 14.10 (Utopic Unicorn):not-affected (code not present)
Package
Upstream:not-affected
Ubuntu 10.04 LTS (Lucid Lynx):DNE
Ubuntu 12.04 LTS (Precise Pangolin):DNE
Ubuntu 13.10 (Saucy Salamander):not-affected
Ubuntu 14.04 LTS (Trusty Tahr):not-affected
Ubuntu 14.10 (Utopic Unicorn):not-affected
Package
Source: nova (LP Ubuntu Debian)
Upstream:released (2013.2.b3)
Ubuntu 10.04 LTS (Lucid Lynx):DNE
Ubuntu 12.04 LTS (Precise Pangolin):released (2012.1.3+stable-20130423-e52e6912-0ubuntu1.4)
Ubuntu 13.10 (Saucy Salamander):not-affected (1:2013.2~rc2-0ubuntu1)
Ubuntu 14.04 LTS (Trusty Tahr):not-affected (1:2014.1~b3-0ubuntu2)
Ubuntu 14.10 (Utopic Unicorn):not-affected (1:2014.1~b3-0ubuntu2)
Patches:
Upstream:https://github.com/openstack/oslo-incubator/commit/ad04e5787a4a651e59636ae7bb28dd9a0b2ee63f (grizzly)
More Information

Valid XHTML 1.0 Strict

Updated: 2014-06-17 23:14:34 UTC (commit 8156)