Note: This is a beta release of Red Hat Bugzilla 5.0. The data contained within is a snapshot of the live data so any changes you make will not be reflected in the production Bugzilla. Also email is disabled so feel free to test any aspect of the site that you want. File any problems you find or give feedback here.
Bug 1551839 - CVE-2018-1000115 memcached: UDP server support allows spoofed traffic amplification DoS [openstack-rdo]
Summary: CVE-2018-1000115 memcached: UDP server support allows spoofed traffic amplifi...
Status: NEW
Alias: None
Product: RDO
Classification: Community
Component: distribution
Version: unspecified
Hardware: Unspecified
OS: Unspecified
Target Milestone: ---
: ---
Assignee: Alan Pevec
QA Contact: Shai Revivo
Whiteboard: component:memcached
Depends On:
TreeView+ depends on / blocked
Reported: 2018-03-06 01:23 UTC by Summer Long
Modified: 2018-04-03 17:29 UTC (History)
15 users (show)

Fixed In Version:
Doc Type: Release Note
Doc Text:
Clone Of:
Last Closed:

Attachments (Terms of Use)

System ID Priority Status Summary Last Updated
RDO 13044 None None None 2018-04-03 17:27:29 UTC
RDO 13217 None None None 2018-04-03 17:28:04 UTC

Description Summer Long 2018-03-06 01:23:38 UTC
This is an automatically created tracking bug!  It was created to ensure
that one or more security vulnerabilities are fixed in affected versions
of openstack-rdo.

For comments that are specific to the vulnerability please use bugs filed
against the "Security Response" product referenced in the "Blocks" field.

For more information see:

When submitting as an update, use the fedpkg template provided in the next
comment(s).  This will include the bug IDs of this tracking bug as well as
the relevant top-level CVE bugs.

Please also mention the CVE IDs being fixed in the RPM changelog and the
fedpkg commit message.

Comment 1 Alfredo Moralejo 2018-04-03 17:29:43 UTC
The fix for this issue is included in memcached-1.5.6-1.el7 . We are rebuilding it in RDO and pushing it to queens repositories. Note that mitigation has been done in TripleO and p-o-i via configuration options.

Note You need to log in before you can comment on or make changes to this bug.