Security update for openstack-heat

SUSE Security Update: Security update for openstack-heat
Announcement ID: SUSE-SU-2014:1103-1
Rating: low
References: #871199 #879062
Affected Products:
  • SUSE Cloud 3

  • An update that solves one vulnerability and has one errata is now available. It includes one version update.

    Description:


    This update for openstack-heat fixes the following security issue:

    * When creating the stack for a template using a provider template,
    OpenStack Heat could allow remote authenticated users to obtain the
    provider template URL via the resource-type-list. (CVE-2014-3801)

    Additionally, the following non-security issues have been fixed:

    * Ensure routing key is specified in the address for a direct producer.
    * Fix loguserdata.py's lost header in the package. (bnc#871199)
    * Add check to prevent introducing regression. (bnc#871199)
    * Raise the default max header to accommodate large tokens.
    * Don't raise MySQL 2013 'Lost connection' errors.

    Security Issues:

    * CVE-2014-3801

    Patch Instructions:

    To install this SUSE Security Update use YaST online_update.
    Alternatively you can run the command listed for your product:

    • SUSE Cloud 3:
      zypper in -t patch sleclo30sp3-openstack-heat-9566

    To bring your system up-to-date, use "zypper patch".

    Package List:

    • SUSE Cloud 3 (x86_64) [New Version: 2013.2.4.dev3.g6f91215]:
      • openstack-heat-2013.2.4.dev3.g6f91215-0.11.2
      • openstack-heat-api-2013.2.4.dev3.g6f91215-0.11.2
      • openstack-heat-api-cfn-2013.2.4.dev3.g6f91215-0.11.2
      • openstack-heat-api-cloudwatch-2013.2.4.dev3.g6f91215-0.11.2
      • openstack-heat-engine-2013.2.4.dev3.g6f91215-0.11.2
      • python-heat-2013.2.4.dev3.g6f91215-0.11.2
    • SUSE Cloud 3 (noarch) [New Version: 2013.2.4.dev3.g6f91215]:
      • openstack-heat-doc-2013.2.4.dev3.g6f91215-0.11.1

    References:

    • http://support.novell.com/security/cve/CVE-2014-3801.html
    • https://bugzilla.novell.com/871199
    • https://bugzilla.novell.com/879062
    • http://download.suse.com/patch/finder/?keywords=bc14e31a2176fa537468974bc2a1a4ee