You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa OpenStack Neutron

Sigurnosni nedostaci programskog paketa OpenStack Neutron

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LUB

==========================================================================
Ubuntu Security Notice USN-2255-1
June 25, 2014

neutron vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 14.04 LTS
– Ubuntu 13.10

Summary:

Several security issues were fixed in OpenStack Neutron.

Software Description:
– neutron: OpenStack Virtual Network Service

Details:

Darragh O’Reilly discovered that the Ubuntu packaging for OpenStack Neutron
did not properly set up its sudo configuration. If a different flaw was
found in OpenStack Neutron, this vulnerability could be used to escalate
privileges. (CVE-2013-6433)

Stephen Ma and Christoph Thiel discovered that the openvswitch-agent in
OpenStack Neutron did not properly perform input validation when creating
security group rules when specifying –remote-ip-prefix. A remote
authenticated attacker could exploit this to prevent application of
additional rules. (CVE-2014-0187)

Thiago Martins discovered that OpenStack Neutron would inappropriately
apply SNAT rules to IPv6 subnets when using the L3-agent. A remote
authenticated attacker could exploit this to prevent floating IPv4
addresses from being attached throughout the cloud. (CVE-2014-4167)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.04 LTS:
python-neutron 1:2014.1-0ubuntu1.3

Ubuntu 13.10:
python-neutron 1:2013.2.3-0ubuntu1.5

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2255-1
CVE-2013-6433, CVE-2014-0187, CVE-2014-4167

Package Information:
https://launchpad.net/ubuntu/+source/neutron/1:2014.1-0ubuntu1.3
https://launchpad.net/ubuntu/+source/neutron/1:2013.2.3-0ubuntu1.5

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
Comment: Using GnuPG with Thunderbird – http://www.enigmail.net/
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=yeW0
—–END PGP SIGNATURE—–

AutorMarijo Plepelic
Cert idNCERT-REF-2014-06-0002-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni nedostaci programskog paketa php5

Otkriveni su sigurnosni nedostaci u programskom paketu php5. Otkriveni nedostaci potencijalnim napadačima omogućuju izvođenje DoS napada i pokretanje proizvoljnog programskog...

Close