SUSE-SU-2014:0089-1: moderate: Security update for python-keystoneclient

sle-security-updates at lists.suse.com sle-security-updates at lists.suse.com
Fri Jan 17 11:04:10 MST 2014


   SUSE Security Update: Security update for python-keystoneclient
______________________________________________________________________________

Announcement ID:    SUSE-SU-2014:0089-1
Rating:             moderate
References:         #824818 #829080 
Cross-References:   CVE-2013-2166 CVE-2013-2167 CVE-2013-2255
                   
Affected Products:
                    SUSE Cloud 2.0
______________________________________________________________________________

   An update that fixes three vulnerabilities is now available.

Description:


   This update fixes the following security issues with
   python-keystoneclient:

   * bnc#829080: OpenStack: various SSL hostname checking
   problems. (CVE-2013-2255)
   * bnc#824818: Bypass encryption or signing security
   strategy. (CVE-2013-2166, CVE-2013-2167)

   Security Issues:

   * CVE-2013-2255
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2255
   >
   * CVE-2013-2167
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2167
   >
   * CVE-2013-2166
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2166
   >


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Cloud 2.0:

      zypper in -t patch sleclo20sp3-python-keystoneclient-8619

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Cloud 2.0 (x86_64):

      python-keystoneclient-0.2.3-0.19.1
      python-keystoneclient-doc-0.2.3-0.19.1


References:

   http://support.novell.com/security/cve/CVE-2013-2166.html
   http://support.novell.com/security/cve/CVE-2013-2167.html
   http://support.novell.com/security/cve/CVE-2013-2255.html
   https://bugzilla.novell.com/824818
   https://bugzilla.novell.com/829080
   http://download.novell.com/patch/finder/?keywords=0eaed759e7a435e4b5bbd29a390653bf



More information about the sle-security-updates mailing list