Security update for openstack-keystone
SUSE Security Update: Security update for openstack-keystone
OpenStack Keystone has been updated to fix a security
problem:
* Dan Prince of Red Hat reported a vulnerability in
token creation error handling in Keystone. By requesting
lots of invalid tokens, an unauthenticated user may fill up
logs on Keystone API servers disks, potentially resulting
in a denial of service attack against Keystone.
(CVE-2013-0247)
Security Issue reference:
* CVE-2013-0247
>
Announcement ID: | SUSE-SU-2013:0402-1 |
Rating: | moderate |
References: | #801289 |
Affected Products: |
An update that fixes one vulnerability is now available.
Description:
OpenStack Keystone has been updated to fix a security
problem:
* Dan Prince of Red Hat reported a vulnerability in
token creation error handling in Keystone. By requesting
lots of invalid tokens, an unauthenticated user may fill up
logs on Keystone API servers disks, potentially resulting
in a denial of service attack against Keystone.
(CVE-2013-0247)
Security Issue reference:
* CVE-2013-0247
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Cloud 1.0:
zypper in -t patch sleclo10sp2-openstack-keystone-7314
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Cloud 1.0 (x86_64):
- openstack-keystone-2012.1+git.1353613280.c17a999-0.7.1
- openstack-keystone-doc-2012.1+git.1353613280.c17a999-0.7.1
- python-keystone-2012.1+git.1353613280.c17a999-0.7.1
References:
- http://support.novell.com/security/cve/CVE-2013-0247.html
- https://bugzilla.novell.com/801289
- http://download.suse.com/patch/finder/?keywords=08f520d613c55ed089a408cb68b2e876