| |
Bug Id: | CSCur68113 |
Title: | CPO Client launch blocked due to expired Cisco certificate |
|
Description: | Symptom: CPO Client launch blocked by Java due to expired Cisco certificate
Conditions: Launch CPO Client
Workaround: Add the CPO server URL (i.e. https://xxx) into the "Exception Site List" of Java Control Panel (Security tab).
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 04-MAY-2015 |
|
Known Affected Releases: | 10.0(0.0.309), 10.0(2), 10.3(0.0.1), 9.6(3), 9.8 |
|
Known Fixed Releases: | 10.3(0.0.192) |
|
|
| |
| |
Bug Id: | CSCuj50333 |
Title: | oracle partition 100% filled |
|
Description: |
Symptom: The audit directory /oracle/diag/optdb/audit audit files fill 100% /oracle file system. This issue has been detected after a long time period (4 months).
Conditions: CPO10 HA GEO medium size
Workaround: remove manually audit files under /oracle/diag/optdb/audit to free space on /oracle
Further Problem Description:
(release notes added by addprefcs-org.ksh)
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 06-MAY-2015 |
|
Known Affected Releases: | 10.0(0.0.309), 10.0(0.0.77), 9.6(3.373) |
|
Known Fixed Releases: | 10.0(0.0.309) |
|
|
| |
| |
Bug Id: | CSCut85058 |
Title: | Slow performance when exporting event log entires longer than a page |
|
Description: | Symptom: Export of event log takes long or even don't terminate
Conditions: When more that a single page is exported (note: it isn't important how many entires the single page contains 1-500 entires).
Workaround: First increase the amount of lines to be displayed per page (maximum pagination is 500 entires per page). If still the export is more than one page, export page by page.
Further Problem Description:
|
|
Status: | Open |
|
Severity: | 2 Severe |
Last Modified: | 20-MAY-2015 |
|
Known Affected Releases: | 10.0(2.1) |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCup22035 |
Title: | Multiple Vulnerabilities in OpenSSL - June 2014 |
|
Description: | Symptom: The following Cisco products
Cisco Prime Optical 10.0 Cisco Prime Optical 9.8 Cisco Prime Optical 9.6.3
include a version of openssl that is affected by the vulnerabilities identified by the Common Vulnerability and Exposures (CVE) IDs:
CVE-2014-0076 - Fix for the attack described in the paper "Recovering OpenSSL ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack"
This bug has been opened to address the potential impact on this product.
Conditions: The Apache web server in bundle with Cisco Prime Optical is affected by the vulnerability.
Workaround: Not Applicable.
Further Problem Description: Not Applicable.
PSIRT Evaluation: The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 1.9/1.7:
https://intellishield.cisco.com/security/alertmanager/cvss?target=new&version=2.0&vector=AV:L/AC:M/Au:N/C:P/I:N/A:N/E:F/RL:U/RC:C
The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 24-MAY-2015 |
|
Known Affected Releases: | 10.0, 10.0(2.0.52), 9.6(3), 9.8 |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCus31428 |
Title: | Oct 2014 OpenSSL Vulnerabilities |
|
Description: | Symptom: This product includes a version of OpenSSL that is affected by the vulnerability identified by the Common Vulnerability and Exposures (CVE) IDs:
CVE-2014-3513, CVE-2014-3567, CVE-2014-3568
This bug has been opened to address the potential impact on this product.
The fix to this bug will be provided with a product patch, to change the version of the vulnerable library.
Conditions: Exposure is not configuration dependent.
Workaround: Not available.
Further Problem Description:
PSIRT Evaluation: The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are: 7.1/6.9
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:H/Au:N/C:P/I:N/A:N/E:F/RL:U/RC:C
The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 24-MAY-2015 |
|
Known Affected Releases: | 10.0, 9.6(3), 9.8 |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCut45919 |
Title: | MARCH 2015 OpenSSL Vulnerabilities |
|
Description: | Symptom: This product includes a version of OpenSSL that is affected by the vulnerability identified by the Common Vulnerability and Exposures (CVE) IDs:
CVE-2015-0286, CVE-2015-0287, CVE-2015-0289, CVE-2015-0292, CVE-2015-0293, CVE-2015-0209, CVE-2015-0288
This bug has been opened to address the potential impact on this product.
The product is affected by the following vulnerabilities: CVE-2015-0204, CVE-2015-0286, CVE-2015-0287, CVE-2015-0289, CVE-2015-0293, CVE-2015-0209, CVE-2015-0288
Conditions: Exposure is not configuration dependent.
Workaround: Not available.
Further Problem Description:
No fix is planned for this product.
PSIRT Evaluation: The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are: 7.1/6.9
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:H/Au:N/C:P/I:N/A:N/E:F/RL:U/RC:C
The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 24-MAY-2015 |
|
Known Affected Releases: | 10.0, 10.3(0.0.192), 9.6(3), 9.8 |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCus42879 |
Title: | JANUARY 2015 OpenSSL Vulnerabilities |
|
Description: | Symptom: This product includes a version of OpenSSL that is affected by the vulnerability identified by the Common Vulnerability and Exposures (CVE) IDs:
CVE-2014-3569, CVE-2014-3570, CVE-2014-3571, CVE-2014-3572, CVE-2014-8275, CVE-2015-0204, CVE-2015-0205, CVE-2015-0206
This bug has been opened to address the potential impact on this product. Conditions: This device has a vulnerable version of OpenSSL, this bug is being used to update the OpenSSL package used on the product. Workaround: None. More Info: The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are: 5.0/3.7
http://tools.cisco.com/security/center/cvssCalculator.x?version=2.0&vector=AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C
The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.
Additional information on Ciscos security vulnerability policy can be found at the following URL:
http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 24-MAY-2015 |
|
Known Affected Releases: | 10.0(0.0.309), 10.0(2), 10.0(2.1), 10.3(0.0.1), 9.6(3.403), 9.8(0.4) |
|
Known Fixed Releases: | 10.3(0.0.192) |
|
|
| |
| |
Bug Id: | CSCur54796 |
Title: | Cisco Prime Optical - evaluation of SSLv3 POODLE vulnerability |
|
Description: | Symptom: Cisco Prime Optical includes a version of SSL that is affected by the vulnerability identified by the Common Vulnerability and Exposures (CVE) IDs:
CVE-2014-3566
This bug has been opened to address the potential impact on this product.
Conditions: Exposure is not configuration dependent.
Workaround: Disable SSLv3 in Apache configuration.
Further Problem Description: OpenSSL will be upgraded to 0.9.8zc in :
Cisco Prime Optical 10.3 (March/April 2015) Cisco Prime Optical 10.0.2 (November/December 2014)
PSIRT Evaluation: The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are: 2.6/2.5
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:H/Au:N/C:P/I:N/A:N/E:F/RL:U/RC:C
The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 24-MAY-2015 |
|
Known Affected Releases: | 10.0, 10.0(2), 10.3(0.0.1), 9.2, 9.3, 9.4(0.153), 9.5, 9.6, 9.6(3), 9.8 |
|
Known Fixed Releases: | 10.3(0.0.192) |
|
|
| |
| |
Bug Id: | CSCuo80198 |
Title: | Installation fails when SYS password is different from the default |
|
Description: | Symptom: Prime Optical server installation fails.
Conditions: The issue occurs if: - Prime Optical is installed with external (not embedded database), and - the Oracle SYS password is modified by the user before launching the Prime Optical installer.
Workaround: Reset the Oracle SYS password to its default value, then install the Prime Optical server. After Prime Optical server installation, the Oracle SYS password can be changed without impacts on the application.
PSIRT Evaluation: The Cisco PSIRT has evaluated this issue and does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via normal resolution channels.
If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another evaluation.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 26-MAY-2015 |
|
Known Affected Releases: | 10.0(0.0.309), 10.0(2.0.1), 9.8(0.3) |
|
Known Fixed Releases: | |
|
|
| |
| |
Bug Id: | CSCuu14373 |
Title: | .aud files filling up inodes for /oracle partition on HA systems |
|
Description: | Symptom: Oracle database crashes and is unable to startup.
Conditions: CPO running in HA GEO redundancy.
Workaround: Delete all .aud files under /oracle/admin/optdb/audit and restart oracle.
Further Problem Description:
|
|
Status: | Fixed |
|
Severity: | 2 Severe |
Last Modified: | 29-MAY-2015 |
|
Known Affected Releases: | 10.0(0.0.309), 10.2(0.0.1), 10.3(0.1), 10.5(0) |
|
Known Fixed Releases: | |
|
|
| |
没有评论:
发表评论