-
Bug
-
Resolution: Unresolved
-
Major
-
4.14
-
None
-
Quality / Stability / Reliability
-
False
-
-
None
-
None
-
None
-
None
-
None
-
CLOUD Sprint 278
-
1
-
In Progress
-
CVE - Common Vulnerabilities and Exposures
-
Disables the unused webhook http servers for Cloud Controller Managers.
-
None
-
None
-
None
-
None
This is a clone of issue OCPBUGS-63167. The following is the description of the original issue:
—
This is a clone of issue OCPBUGS-63166. The following is the description of the original issue:
—
This is a clone of issue OCPBUGS-63165. The following is the description of the original issue:
—
This is a clone of issue OCPBUGS-63164. The following is the description of the original issue:
—
This is a clone of issue OCPBUGS-51305. The following is the description of the original issue:
—
Description of problem:
Vulnerability Identified: SSL Medium Strength Cipher Suites Supported (SWEET32) Port: 10258 Protocol: TCP Cipher Suite(s): ECDHE-RSA-DES-CBC3-SHA, DES-CBC3-SHA (3DES with 168-bit keys) CVE: CVE-2016-2183 The AWS CCM is expected to be listening on port 10258 on an AWS cluster. On the customers cluster it is listening but for me on the lab cluster it was not running. ~~~~ netstat -tupan | grep '10258' tcp6 0 0 :::10258 :::* LISTEN 1311638/aws-cloud-c ~~~
Version-Release number of selected component (if applicable):
How reproducible:
Steps to Reproduce:
1. 2. 3.
Actual results:
Expected results:
Additional info:
- blocks
-
OCPBUGS-63169 Vulnerability Identified: SSL Medium Strength Cipher Suites Supported (SWEET32) for tcp/10258
-
- POST
-
- clones
-
OCPBUGS-63167 Vulnerability Identified: SSL Medium Strength Cipher Suites Supported (SWEET32) for tcp/10258
-
- POST
-
- is blocked by
-
OCPBUGS-63167 Vulnerability Identified: SSL Medium Strength Cipher Suites Supported (SWEET32) for tcp/10258
-
- POST
-
- is cloned by
-
OCPBUGS-63169 Vulnerability Identified: SSL Medium Strength Cipher Suites Supported (SWEET32) for tcp/10258
-
- POST
-
- links to