Cisco Blog » The Platform

2015年9月1日星期二

Cisco Notification Alert -Cisco UCS Director - For Large Scale DC-01-Sep-2015 16:53 GMT

 

 

 

 

 

 

 


Software Updates for UCS Director

Product Name:
UCS Director 5.3
Software Type:
UCS Director Virtual Appliance Software
Release Version:
5
Alert Type:
New File
File Name:
cucsd_patch_5_3_1_2.zip
File Description:

Cisco UCS Director 5.3.1.2 upgrade patch

File Release Date:
04-AUG-2015
Find additional information in Software Downloads index.

Known Bugs - UCS Director

Alert Type:
Updated *
Bug Id:
CSCuh87549
Title:
persistent xss - cloupia - /app/cloudmgr/portal/userreport.html
Status:
Fixed
Severity:
2 Severe
Description: *

Symptoms:
A vulnerability in Cloupia of Cisco Intelligent Automation for Cloud could allow an authenticated, remote attacker to conduct a cross-site
scripting (XSS) attack.

The vulnerability is due to insufficient input validation of a parameter. An attacker could exploit this vulnerability by persuading a user to
access a malicious link.

Conditions:
An affected device with default configuration.

Workaround:
None

Further Problem Description:
None

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 3.5/3.5:
http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:N/AC:M/Au:S/C:N/I:P/A:N/E:H/RL:U/RC:C&version=2.0
No CVE ID has been assigned to this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Last Modified:
11-AUG-2015
Known Affected Releases:
3.4(1.1)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuh87565
Title:
Persistent XSS in Cloupia Tomcat Log
Status:
Fixed
Severity:
2 Severe
Description: *

Symptoms:
A vulnerability in Cloupia of Cisco Intelligent Automation for Cloud could allow an authenticated, remote attacker to conduct a cross-site
scripting (XSS) attack.

The vulnerability is due to insufficient input validation of a parameter. An attacker could exploit this vulnerability by persuading a user to
access a malicious link.

Conditions:
An affected device with default configuration.

Workaround:
None

Further Problem Description:
None

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 3.5/3.5:
http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:N/AC:M/Au:S/C:N/I:P/A:N/E:H/RL:U/RC:C&version=2.0
No CVE ID has been assigned to this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Last Modified:
11-AUG-2015
Known Affected Releases:
3.4(1.1)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuv03354
Title:
Unable to Add UCSM 2.2-(5a) Account in UCSD 5.3 Appliance.
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
Unable to Add UCSM Account Version 2.2 (5a) in the UCSD Version 5.3.

Conditions:
In the UCSD , Administration -> Physical Accounts, While Try to add the UCSM Account Version 2.2 (5a) will show 'Account Not Reachable' Message.

Workaround:
Apply UCSD Version : 5.3.1.1 Patch.

Further Problem Description:

Last Modified:
30-AUG-2015
Known Affected Releases:
5.3(0.0), 5.3(1.0), 5.3(2.0)
Known Fixed Releases:
5.3(1.1), 5.3(1.2)
Alert Type:
New
Bug Id:
CSCuv94260
Title:
Update Trunk removing VLANs for some port-channels
Status:
Open
Severity:
2 Severe
Description:

Symptom:
Traffic drop as VLANs removed from trunk configuration

Conditions:
Port-channel configuration with multiple VLANs part of the trunk

Workaround:
None

Further Problem Description:
Impacts functionality

Last Modified:
26-AUG-2015
Known Affected Releases:
5.3(1.2)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuh87560
Title:
Persistent XSS in Cloupia Infra Manager Log
Status:
Fixed
Severity:
2 Severe
Description: *

Symptoms:
A vulnerability in Cloupia of Cisco Intelligent Automation for Cloud could allow an authenticated, remote attacker to conduct a cross-site
scripting (XSS) attack.

The vulnerability is due to insufficient input validation of a parameter. An attacker could exploit this vulnerability by persuading a user to
access a malicious link.

Conditions:
An affected device with default configuration.

Workaround:
None

Further Problem Description:
None

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 3.5/3.5:
http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:N/AC:M/Au:S/C:N/I:P/A:N/E:H/RL:U/RC:C&version=2.0
No CVE ID has been assigned to this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Last Modified:
11-AUG-2015
Known Affected Releases:
3.4(1.1)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuh87547
Title:
persistent xss - cloupia - /app/cloudmgr/portal/approvals.html
Status:
Fixed
Severity:
2 Severe
Description: *

Symptoms:
A vulnerability in Cloupia of Cisco Intelligent Automation for Cloud could allow an authenticated, remote attacker to conduct a cross-site
scripting (XSS) attack.

The vulnerability is due to insufficient input validation of a parameter. An attacker could exploit this vulnerability by persuading a user to
access a malicious link.

Conditions:
An affected device with default configuration.

Workaround:
None

Further Problem Description:
None

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 3.5/3.5:
http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:N/AC:M/Au:S/C:N/I:P/A:N/E:H/RL:U/RC:C&version=2.0
No CVE ID has been assigned to this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Last Modified:
11-AUG-2015
Known Affected Releases:
3.4(1.1)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuh87557
Title:
Persistent XSS in Cloupia Advanced System Information Log
Status:
Fixed
Severity:
2 Severe
Description: *

Symptoms:
A vulnerability in Cloupia of Cisco Intelligent Automation for Cloud could allow an authenticated, remote attacker to conduct a cross-site
scripting (XSS) attack.

The vulnerability is due to insufficient input validation of a parameter. An attacker could exploit this vulnerability by persuading a user to
access a malicious link.

Conditions:
An affected device with default configuration.

Workaround:
None

Further Problem Description:
None

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 3.5/3.5:
http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:N/AC:M/Au:S/C:N/I:P/A:N/E:H/RL:U/RC:C&version=2.0
No CVE ID has been assigned to this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Last Modified:
11-AUG-2015
Known Affected Releases:
3.4(1.1)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuh87544
Title:
persistent xss - cloupia - CloudSense HTML Reports
Status:
Terminated
Severity:
2 Severe
Description: *

Symptoms:
A vulnerability in Cloupia of Cisco Intelligent Automation for Cloud could allow an authenticated, remote attacker to conduct a cross-site
scripting (XSS) attack.

The vulnerability is due to insufficient input validation of a parameter. An attacker could exploit this vulnerability by persuading a user to
access a malicious link.

Conditions:
An affected device with default configuration.

Workaround:
None

Further Problem Description:
None

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 3.5/3.5:
http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:N/AC:M/Au:S/C:N/I:P/A:N/E:H/RL:U/RC:C&version=2.0
No CVE ID has been assigned to this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Last Modified:
11-AUG-2015
Known Affected Releases:
3.4(1.1)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuu90229
Title:
SRM: Unable to roll back some of the SRM tasks
Status:
Terminated
Severity:
3 Moderate
Description:

Symptom:
Unable to roll back some of the SRM tasks

Conditions:
API is not available to implement rollback (delete)

Unable to roll back some of the SRM tasks,Below tasks are not implemented with Rollback functionality
Add Srm Folder Mapping
Add Srm Network Mapping
Add Srm Resource Pool Mapping
Add Protection Group to Recovery Plan
Create SRM protection group

Workaround:
N/A

Further Problem Description:

Last Modified:
20-AUG-2015
Known Affected Releases:
5.3(2.0)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuv77720
Title:
VM Provision task isue if Catalog is user input without windows license
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
VMware Provision Inputs task cannot be submitted

Conditions:
If no windows license is provided in Catalog or System Policy
If Catalog selection is mapped as user input

Workaround:
Create system policy or catalog with windows license

Further Problem Description:

Last Modified:
19-AUG-2015
Known Affected Releases:
5.3(1.1)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuv97040
Title:
VM Provision fails intermittently due to issue finding network resources
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
VM Provision fails intermittently due to issue finding network resources

Conditions:
None

Workaround:
None

Further Problem Description:

Last Modified:
28-AUG-2015
Known Affected Releases:
5.3(1.1)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuv45598
Title:
To address only the crontab missing in 5.3.1.2 release
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Customer found an issue while configure the Crontab, 'vixie-cron is no longer included in the OVF .due to missing files unable to execute Crontab.

Conditions:
Unable to execute the Crontab and also 'vixie-cron' package related commands on 5.3 Appliance.

Workaround:
Apply 5.3.1.2 Patch, which fix ''vixie-cron ' Packages issue.

Further Problem Description:

Last Modified:
27-AUG-2015
Known Affected Releases:
5.3(1.2)
Known Fixed Releases:
5.3(1.2)
Alert Type:
New
Bug Id:
CSCuv99860
Title:
Access Denied trying to connect to NetApp with VSC
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
When running custom workflow task we are hitting access denied issue

Conditions:
None

Workaround:
None

Further Problem Description:

Last Modified:
29-AUG-2015
Known Affected Releases:
5.2(0.2)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuw02358
Title:
HyperV inventory collection some of the resources not getting updated
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
While getting data for Hosts, VMs and other objects, timeout is occurring when the wait period of the cmdlets is exceeding 5 minutes.In such cases the call bails out with a ?Connection Timed Out? Exception, and no data is returned.

Conditions:
Due to large infrastructure

Workaround:
None

Further Problem Description:

Last Modified:
31-AUG-2015
Known Affected Releases:
5.3(1.2)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuu88213
Title:
SRM:Folder report need to show secondary folder information
Status:
Terminated
Severity:
4 Minor
Description:

Symptom:
Folder report need to show secondary folder information

Conditions:
Its a limitation at frame work level in the UCSD

Workaround:
If you map these tasks in the work flow then you can able to get the desired outputs but individually if you you will get the validation issues

Further Problem Description:

Last Modified:
20-AUG-2015
Known Affected Releases:
5.3(2.0)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuv73989
Title:
Validating imported WFs (default factory WFs) in different thread
Status:
Fixed
Severity:
6 Enhancement
Description:

Symptom:
When trying to execute a workflow and if we get "Workflow needs to be validated before executing it" message.

Conditions:
When execute 'Not Validated' workflow

Workaround:
Have to manually validate to execute the workflow or wait till the 'Workflow Validation System task" validates the workflow.

Further Problem Description:

Last Modified:
21-AUG-2015
Known Affected Releases:
5.3(2.0), 5.4(0.0)
Known Fixed Releases:

Find additional information in Bug Search index.

 

2013 Cisco and/or its affiliates. All rights reserved. Terms & Conditions | Privacy Statement | Cookie Policy | Trademarks

 

没有评论:

发表评论