Sicherheit: Mangelnde Rechteprüfung in openstack-foreman-installer
||Mangelnde Rechteprüfung in openstack-foreman-installer
||Red Hat Enterprise Linux OpenStack Platform
||Fr, 30. Mai 2014, 00:34
-----BEGIN PGP SIGNED MESSAGE-----
Red Hat Security Advisory
Synopsis: Moderate: openstack-foreman-installer security, bug fix, and
Advisory ID: RHSA-2014:0517-01
Product: Red Hat Enterprise Linux OpenStack Platform
Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0517.html
Issue date: 2014-05-29
CVE Names: CVE-2013-6470
An updated openstack-foreman-installer package that fixes one security
issue, several bugs, and adds various enhancements is now available for Red
Hat Enterprise Linux OpenStack Platform 4.0.
The Red Hat Security Response Team has rated this update as having Moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux OpenStack Platform 4.0 - noarch
The openstack-foreman-installer package provides facilities for rapidly
deploying Red Hat Enterprise Linux OpenStack Platform 4.
It was discovered that the Qpid configuration created by
openstack-foreman-installer did not have authentication enabled when run
with default settings in standalone mode. An attacker able to establish a
TCP connection to Qpid could access any OpenStack back end using Qpid (for
example, nova) without any authentication. (CVE-2013-6470)
This update also fixes several bugs and adds enhancements. Documentation
for these changes is available in the Technical Notes document linked to
in the References section.
All openstack-foreman-installer users are advised to upgrade to this
updated package, which corrects these issues and adds these enhancements.
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
5. Bugs fixed (https://bugzilla.redhat.com/):
1033247 - [RFE] Global Parameter Boolean for Specifying Service Deployment
1049122 - Install a Highly Available OpenStack deployment using Foreman (qpid)
1051994 - CVE-2013-6470 openstack foreman-installer: insecure defaults
1053623 - openstack-foreman-installer: openstack-selinux package is not
installed on the foreman_clients (it cause: multiple AVCs in messages).
1062699 - [RFE] foreman should allow for cinder share mount options on HA
1064050 - [RFE] foreman should allow the configuraiton of glance using RHS/NFS
and direct file access
1064056 - Foreman Heat ports not opened in a foreman based Nova network install
1068885 - Foreman-installer doesn't create keystonerc_admin file on
1073087 - [RFE] Use subscription-manager in kickstart template, not rhnreg_ks
1073550 - Change foreman-installer to use openstack-puppet-modules
1077818 - Modify installer to accept environment variable for Foreman
1078279 - Pull latest Cisco Nexus updates
1080638 - openshift-enterprise HA template egress rules block cloud-init
1084534 - Add Nova Service to HA hostgroup
1085547 - Keystone role is created as _member_ instead of Member
1087713 - Add Swift Proxy service to HA hostgroup
1088608 - Add Neutron Service to HA hostgroup
1088611 - Add Heat Service to HA hostgroup
1095853 - [Rubygem-Staypuft]:When attempting to browse : Infrastructure -->
Compute Resources' getting "Not Implemented" page (as well to other pages) .
1099661 - OpenStack-Foreman-Installer: Failed to deploy Neutron-Compute using
O-F-I due to 'Invalid parameter ceilometer_host'.
1100411 - ceilometer attempts to start before mongo service is ready
6. Package List:
Red Hat Enterprise Linux OpenStack Platform 4.0:
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
The Red Hat security contact is <email@example.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2014 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)
-----END PGP SIGNATURE-----
Enterprise-watch-list mailing list