Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2015:1679 - Security Advisory
Issued:
2015-08-24
Updated:
2015-08-24

RHSA-2015:1679 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: python-django-horizon security and bug fix update

Type/Severity

Security Advisory: Moderate

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated python-django-horizon packages that fix multiple security issues
are now available for Red Hat Enterprise Linux OpenStack Platform 6.0.

Red Hat Product Security has rated this update as having Moderate security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.

Description

OpenStack Dashboard (Horizon) provides administrators and users with a
graphical interface to access, provision, and automate cloud-based
resources.

Two security issues were discovered in the Horizon dashboard and are
addressed in this update:

  • A cross-site scripting (XSS) flaw was found in the Horizon Orchestration

dashboard. An attacker able to trick a Horizon user into using a malicious
template during the stack creation could use this flaw to perform an XSS
attack on that user. (CVE-2015-3219)

Red Hat would like to thank the OpenStack Project for reporting the
CVE-2015-3219 issue. Upstream acknowledges Nikita Konovalov from Mirantis
as the original reporter of CVE-2015-3219.

  • A flaw was discovered in the Horizon metadata dashboard whereby

potentially untrusted data was displayed from Glance images, Nova flavors,
or host aggregates without correct clean up. An attacker could use this
flaw to conduct an XSS attack.(CVE-2015-3988)

Additionally, the following non-security issues are addressed:

  • It was impossible to associate a floating IP address to a port for an

instance. This occurred if the gateway router was not in the same tenant as
the instance but was attached to a network shared across tenants because
only ports within the tenant were used to find reachable gateway routers.
(BZ#1187992)

  • If two or more regions were configured in Horizon, then the User, Help,

and Current Project links would no longer work and the region selector
was in the wrong location in the UI. (BZ#1189887)

  • A load balancer monitor was erroneously displayed as associated with

every tenant in every pool. The load balancer monitor was not actually
associated with any tenants, but the improper display prevented users
from using the Horizon dashboard to create a tenant association.
(BZ#1196249)

  • When logging into the Horizon dashboard, Horizon sends a query to Nova to

update usage statistics. One of the calls would erroneously query deleted
virtual machines; if there were thousands of deleted virtual machines, the
CPU usage for Nova would spike and the Nova process could crash.
(BZ#1243301)

  • The network profile was not supported by Cisco N1KV ML2 drivers. This

profile has been removed to maintain Horizon compatibility with the Cisco
driver. (BZ#1246690)

  • A neutron attribute extension was renamed from profile_id to profile for

networks and ports. This caused create operations for networks and ports to
fail from the dashboard since the dashboard was still using the attribute
name n1kv:profile_id rather than n1kv:profile.(BZ#1248367)

  • If a virtual machine instance failed to launch, then the stale port

assignments were left in the configuration rather than being cleaned up.
(BZ#1249228)

All python-django-horizon users are advised to upgrade to these updated
packages, which correct these issues.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258

Affected Products

  • Red Hat OpenStack 6.0 x86_64

Fixes

  • BZ - 1187992 - [Horizon] Fix display of ports when associating floating IP
  • BZ - 1196249 - LBaaS health monitor created from horizon shows associated with all pools
  • BZ - 1222871 - CVE-2015-3988 python-django-horizon: persistent XSS in Horizon metadata dashboard
  • BZ - 1228534 - CVE-2015-3219 python-django-horizon: XSS in Heat stack creation
  • BZ - 1243301 - nova API cannot allocate memory due to horizon os-simple-tenant-usage calls

CVEs

  • CVE-2015-3219
  • CVE-2015-3988

References

  • https://access.redhat.com/security/updates/classification/#moderate
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat OpenStack 6.0

SRPM
x86_64
openstack-dashboard-2014.2.3-7.el7ost.noarch.rpm SHA-256: 0e9749d8422cce1c90e86338823856828302442cd49b8abda93a5f626656f0d4
openstack-dashboard-theme-2014.2.3-7.el7ost.noarch.rpm SHA-256: 1e27fea929cee9985b85ed6cd458b1e66166194e090f456ad23ef10bcd5a4441
python-django-horizon-2014.2.3-7.el7ost.noarch.rpm SHA-256: e20578d85ca91d2888434af25a3b1e64d0d0b75f97b5cc8ca8f716e0a8bce009
python-django-horizon-doc-2014.2.3-7.el7ost.noarch.rpm SHA-256: 4865d94f68d89f9a16de9e4fde002a6e0854246ca33fbffca90ddeb12f33e947

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility