SUSE Security Update: Security update for openstack-keystone
______________________________________________________________________________
Announcement ID: SUSE-SU-2014:0848-1
Rating: important
References: #881977
Cross-References: CVE-2014-3476
Affected Products:
SUSE Cloud 3
______________________________________________________________________________
An update that fixes one vulnerability is now available. It
includes one version update.
Description:
openstack-keystone was updated to version 2013.2.4.dev5.g9162837 to fix
one security issue and one regular bug:
* Privilege escalation through trust chained delegation.
(CVE-2014-3476)
* Fix invalid LDAP filter for user ID with commas.
Security Issue reference:
* CVE-2014-3476
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3476>
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
– SUSE Cloud 3:
zypper in -t patch sleclo30sp3-openstack-keystone-9378
To bring your system up-to-date, use “zypper patch”.
Package List:
– SUSE Cloud 3 (x86_64) [New Version: 2013.2.4.dev5.g9162837]:
openstack-keystone-2013.2.4.dev5.g9162837-0.7.1
python-keystone-2013.2.4.dev5.g9162837-0.7.1
– SUSE Cloud 3 (noarch) [New Version: 2013.2.4.dev5.g9162837]:
openstack-keystone-doc-2013.2.4.dev5.g9162837-0.7.1
References:
http://support.novell.com/security/cve/CVE-2014-3476.html
https://bugzilla.novell.com/881977
http://download.suse.com/patch/finder/?keywords=7e3827dc35a978ab61c2261344784e9b
—
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org