You are here
Home > Preporuke > Ranjivosti programskog paketa openstack-keystone

Ranjivosti programskog paketa openstack-keystone

  • Detalji os-a: FED
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LFE

——————————————————————————–
Fedora Update Notification
FEDORA-2014-5497
2014-04-23 03:00:55
——————————————————————————–

Name : openstack-keystone
Product : Fedora 20
Version : 2013.2.3
Release : 5.fc20
URL : http://keystone.openstack.org/
Summary : OpenStack Identity Service
Description :
Keystone is a Python implementation of the OpenStack
(http://www.openstack.org) identity service API.

This package contains the Keystone daemon.

——————————————————————————–
Update Information:

* Sanitizes authentication methods received in requests CVE-2014-2828
* Privilege escalation through trust chained delegation CVE-2014-3476
* Keystone V2 trusts privilege escalation through user supplied project id CVE-2014-3520

——————————————————————————–
ChangeLog:

* Wed Jul 9 2014 Alan Pevec <apevec@redhat.com> 2013.2.3-5
– Keystone V2 trusts privilege escalation through user supplied project id
CVE-2014-3520
* Fri Jun 13 2014 Alan Pevec <apevec@redhat.com> 2013.2.3-4
– privilege escalation through trust chained delegation CVE-2014-3476
* Mon Apr 21 2014 Alan Pevec <apevec@redhat.com> 2013.2.3-3
– Sanitizes authentication methods received in requests CVE-2014-2828
* Fri Apr 4 2014 Alan Pevec <apevec@redhat.com> 2013.2.3-2
– updated to stable havana 2013.2.3 release
– Trustee token revocation does not work with memcache backend CVE-2014-2237
* Fri Feb 14 2014 Alan Pevec <apevec@redhat.com> 2013.2.2-1
– updated to stable havana 2013.2.2 release
* Tue Dec 17 2013 Alan Pevec <apevec@redhat.com> 2013.2.1-1
– updated to stable havana 2013.2.1 release CVE-2013-6391
* Wed Oct 30 2013 Alan Pevec <apevec@redhat.com> 2013.2-2
– unintentional role granting with Keystone LDAP backend CVE-2013-4477
* Thu Oct 17 2013 Alan Pevec <apevec@redhat.com> – 2013.2-1
– Update to havana final
* Mon Oct 7 2013 Alan Pevec <apevec@redhat.com> – 2013.2-0.14.rc1
– rename HTTPD integration to keystone.wsgi
* Wed Oct 2 2013 Adam Young <ayoung@redhat> – 2013.2-0.11.rc1
– HTTPD integration files
* Wed Oct 2 2013 Alan Pevec <apevec@redhat.com> – 2013.2-0.10.rc1
– Havana release candidate
——————————————————————————–
References:

[ 1 ] Bug #1086211 – CVE-2014-2828 openstack-keystone: denial of service via V3 API authentication chaining
https://bugzilla.redhat.com/show_bug.cgi?id=1086211
[ 2 ] Bug #1104524 – CVE-2014-3476 openstack-keystone: privilege escalation through trust chained delegation
https://bugzilla.redhat.com/show_bug.cgi?id=1104524
[ 3 ] Bug #1112668 – CVE-2014-3520 openstack-keystone: Keystone V2 trusts privilege escalation through user supplied project id
https://bugzilla.redhat.com/show_bug.cgi?id=1112668
——————————————————————————–

This update can be installed with the “yum” update program. Use
su -c ‘yum update openstack-keystone’ at the command line.
For more information, refer to “Managing Software with yum”,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce

AutorTomislav Protega
Cert idNCERT-REF-2014-08-0023-ADV
CveCVE-2014-2828 CVE-2014-3476 CVE-2014-3520 CVE-2014-2237 CVE-2013-6391 CVE-2013-4477
ID izvornikaFEDORA-2014-5497
Proizvodopenstack-keystone
Izvorhttp://www.redhat.com
Top
More in Preporuke
Sigurnosni nedostaci CIFS poslužitelja

Otkriveni su sigurnosni nedostaci u radu CIFS poslužitelja za HP-UX. Otkriveni nedostaci potencijalnim napadačima omogućuju izvođenje napada uskraćivanjem usluge, pokretanje...

Close