<div dir="ltr">For me, if it is still supported today then we should issue the OSSA.<div>-bryan</div></div><div class="gmail_extra"><br><br><div class="gmail_quote">On Thu, Jan 30, 2014 at 5:32 PM, Jeremy Stanley <span dir="ltr"><<a href="mailto:fungi@yuggoth.org" target="_blank">fungi@yuggoth.org</a>></span> wrote:<br>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div class="im">On 2014-01-30 17:17:53 -0800 (-0800), Bryan D. Payne wrote:<br>
> Are you thinking an OSSN or an OSSA? The advisory (OSSA) is<br>
> often what is used for security issues that have been fixed and<br>
> we want to tell people to upgrade. The note (OSSN) is often what<br>
> is used for guidance on configuring one's system securely.<br>
<br>
</div>Good point. It looks like this was fixed early in the Havana<br>
development cycle, but not dealt with as a security vulnerability<br>
nor brought to the VMT's attention at the time. Since QPid support<br>
seems to have been in place around the Essex release we could in<br>
theory issue a retroactive OSSA affecting Grizzly (but its end of<br>
support is only about a month away now). Thoughts?<br>
<span class="HOEnZb"><font color="#888888">--<br>
Jeremy Stanley<br>
</font></span><div class="HOEnZb"><div class="h5"><br>
_______________________________________________<br>
Openstack-security mailing list<br>
<a href="mailto:Openstack-security@lists.openstack.org">Openstack-security@lists.openstack.org</a><br>
<a href="http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-security" target="_blank">http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-security</a><br>
</div></div></blockquote></div><br></div>