Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in openstack-keystone
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in openstack-keystone
ID: FEDORA-2014-5497
Distribution: Fedora
Plattformen: Fedora 20
Datum: Do, 7. August 2014, 23:21
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2828
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3476
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3520
Applikationen: OpenStack

Originalnachricht

Name        : openstack-keystone
Product : Fedora 20
Version : 2013.2.3
Release : 5.fc20
URL : http://keystone.openstack.org/
Summary : OpenStack Identity Service
Description :
Keystone is a Python implementation of the OpenStack
(http://www.openstack.org) identity service API.

This package contains the Keystone daemon.

-------------------------------------------------------------------------------
-
Update Information:

* Sanitizes authentication methods received in requests CVE-2014-2828
* Privilege escalation through trust chained delegation CVE-2014-3476
* Keystone V2 trusts privilege escalation through user supplied project id
CVE-2014-3520

-------------------------------------------------------------------------------
-
ChangeLog:

* Wed Jul 9 2014 Alan Pevec <apevec@redhat.com> 2013.2.3-5
- Keystone V2 trusts privilege escalation through user supplied project id
CVE-2014-3520
* Fri Jun 13 2014 Alan Pevec <apevec@redhat.com> 2013.2.3-4
- privilege escalation through trust chained delegation CVE-2014-3476
* Mon Apr 21 2014 Alan Pevec <apevec@redhat.com> 2013.2.3-3
- Sanitizes authentication methods received in requests CVE-2014-2828
* Fri Apr 4 2014 Alan Pevec <apevec@redhat.com> 2013.2.3-2
- updated to stable havana 2013.2.3 release
- Trustee token revocation does not work with memcache backend CVE-2014-2237
* Fri Feb 14 2014 Alan Pevec <apevec@redhat.com> 2013.2.2-1
- updated to stable havana 2013.2.2 release
* Tue Dec 17 2013 Alan Pevec <apevec@redhat.com> 2013.2.1-1
- updated to stable havana 2013.2.1 release CVE-2013-6391
* Wed Oct 30 2013 Alan Pevec <apevec@redhat.com> 2013.2-2
- unintentional role granting with Keystone LDAP backend CVE-2013-4477
* Thu Oct 17 2013 Alan Pevec <apevec@redhat.com> - 2013.2-1
- Update to havana final
* Mon Oct 7 2013 Alan Pevec <apevec@redhat.com> - 2013.2-0.14.rc1
- rename HTTPD integration to keystone.wsgi
* Wed Oct 2 2013 Adam Young <ayoung@redhat> - 2013.2-0.11.rc1
- HTTPD integration files
* Wed Oct 2 2013 Alan Pevec <apevec@redhat.com> - 2013.2-0.10.rc1
- Havana release candidate
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #1086211 - CVE-2014-2828 openstack-keystone: denial of service via
V3 API authentication chaining
https://bugzilla.redhat.com/show_bug.cgi?id=1086211
[ 2 ] Bug #1104524 - CVE-2014-3476 openstack-keystone: privilege escalation
through trust chained delegation
https://bugzilla.redhat.com/show_bug.cgi?id=1104524
[ 3 ] Bug #1112668 - CVE-2014-3520 openstack-keystone: Keystone V2 trusts
privilege escalation through user supplied project id
https://bugzilla.redhat.com/show_bug.cgi?id=1112668
-------------------------------------------------------------------------------
-

This update can be installed with the "yum" update program. Use
su -c 'yum update openstack-keystone' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung