drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in OpenStack
Name: |
Mehrere Probleme in OpenStack |
|
ID: |
USN-2324-1 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 14.04 LTS |
|
Datum: |
Fr, 22. August 2014, 08:43 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3476
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3520
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5251
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5252
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5253 |
|
Applikationen: |
OpenStack |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============2677361350396920422== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="rT97b2DnwAI8HiCmjsdwjcmPuFA0Bnf7o"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --rT97b2DnwAI8HiCmjsdwjcmPuFA0Bnf7o Content-Type: text/plain; charset=utf- Content-Transfer-Encoding: quoted-printable
========================================================================== Ubuntu Security Notice USN-2324-1 August 21, 2014
keystone vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 LTS
Summary:
Several security issues were fixed in OpenStack Keystone.
Software Description: - keystone: OpenStack identity service
Details:
Steven Hardy discovered that OpenStack Keystone did not properly handle chained delegation. A remove authenticated attacker could use this to gain privileges by creating a new token with additional roles. (CVE-2014-3476)
Jamie Lennox discovered that OpenStack Keystone did not properly validate the project id. A remote authenticated attacker may be able to use this to access other projects. (CVE-2014-3520)
Brant Knudson and Lance Bragstad discovered that OpenStack Keystone would not always revoke tokens correctly. If Keystone were configured to use revocation events, a remote authenticated attacker could continue to have access to resources. (CVE-2014-5251, CVE-2014-5252, CVE-2014-5253)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 14.04 LTS: python-keystone 1:2014.1.2.1-0ubuntu1.1
In general, a standard system update will make all the necessary changes.
References: http://www.ubuntu.com/usn/usn-2324-1 CVE-2014-3476, CVE-2014-3520, CVE-2014-5251, CVE-2014-5252, CVE-2014-5253
Package Information: https://launchpad.net/ubuntu/+source/keystone/1:2014.1.2.1-0ubuntu1.1
--rT97b2DnwAI8HiCmjsdwjcmPuFA0Bnf7o Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIcBAEBCgAGBQJT9mB9AAoJEFHb3FjMVZVzmf0QAJ/yZYgKNx5VLEvPEO63erK2 NxMc/U5juDh4o0gwrrXQFAF6WjLOMA6BlRy3T7q9WSsxeJqekcBuAU8CfSkcRG85 hMpbbic+kH12FJC/fvXmMFH4SGhwPsFiXgZebz91lR3OMdG/A8CgrxvIoGuQ1G2K yA5oe3gVI6s674o/VY43usaawN667OUKxDitiILASBpcQxxH9nZsr4LWIUKhisK0 S8YxNmeSceO2Jx5q18tecRdtVB3zMTePngpuhP7IXKUJebYg7i/jbw/ZDfiPQmE9 DdAnbBJ9rJ8DzaC8DBr6W+0Dd1whNvnl02at0dVzpI2G10zQ0JBf5aRjnGMpk5We PhMsx6GkzsSR6rGKdu3Uif4IA0TolHIPAOX2rJrJUFGp+8mWsDlchbP+mWdyVD7q l+2+/wXPrddMcfrTZ4MlqyPYcIP+sbko8cPYn0/JWm3luFm+wzuSdVsBZsrNLaOp Cql9GHjKfeM7UJb0H9fZOfbgKjx3C0AsUiE9MJRbkxloZh33MfkIp1jUvPUw+8li FBndtt0PxMayOmzX4nsLPSVb+gTnawEpGHvBc1ZFFQSQYTuOA9a+ttCLZxWjUHNh DpthH6y39nvC1OvFHua1sGxmbnd8K1lGNHVFZsAk2yu84I0+OhwEmllNeCguMqHn DWybXa1jn+ETQZ5ByAy/ =H4H2 -----END PGP SIGNATURE-----
--rT97b2DnwAI8HiCmjsdwjcmPuFA0Bnf7o--
--===============2677361350396920422== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
--===============2677361350396920422==--
|
|
|
|