Security update for openstack-keystone
SUSE Security Update: Security update for openstack-keystone
openstack-keystone was updated to version 2013.2.4.dev5.g9162837 to fix
one security issue and one regular bug:
* Privilege escalation through trust chained delegation.
(CVE-2014-3476)
* Fix invalid LDAP filter for user ID with commas.
Security Issue reference:
* CVE-2014-3476
Announcement ID: | SUSE-SU-2014:0848-1 |
Rating: | important |
References: | #881977 |
Affected Products: |
An update that fixes one vulnerability is now available. It includes one version update.
Description:
openstack-keystone was updated to version 2013.2.4.dev5.g9162837 to fix
one security issue and one regular bug:
* Privilege escalation through trust chained delegation.
(CVE-2014-3476)
* Fix invalid LDAP filter for user ID with commas.
Security Issue reference:
* CVE-2014-3476
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Cloud 3:
zypper in -t patch sleclo30sp3-openstack-keystone-9378
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Cloud 3 (x86_64) [New Version: 2013.2.4.dev5.g9162837]:
- openstack-keystone-2013.2.4.dev5.g9162837-0.7.1
- python-keystone-2013.2.4.dev5.g9162837-0.7.1
- SUSE Cloud 3 (noarch) [New Version: 2013.2.4.dev5.g9162837]:
- openstack-keystone-doc-2013.2.4.dev5.g9162837-0.7.1
References:
- http://support.novell.com/security/cve/CVE-2014-3476.html
- https://bugzilla.novell.com/881977
- http://download.suse.com/patch/finder/?keywords=7e3827dc35a978ab61c2261344784e9b