SUSE-SU-2014:1365-1: Security update for openstack-keystone
sle-security-updates at lists.suse.com
sle-security-updates at lists.suse.com
Thu Nov 6 04:04:37 MST 2014
SUSE Security Update: Security update for openstack-keystone
______________________________________________________________________________
Announcement ID: SUSE-SU-2014:1365-1
Rating: low
References: #895847 #897467 #897744 #897815
Cross-References: CVE-2014-3621
Affected Products:
SUSE Cloud 4
______________________________________________________________________________
An update that solves one vulnerability and has three fixes
is now available. It includes one version update.
Description:
This update for openstack-keystone provides stability and security fixes
from the upstream OpenStack project:
* Adds a whitelist for endpoint catalog substitution (bnc#895847,
CVE-2014-3621)
* Avoid conversion of binary LDAP values (bnc#897467)
* No longer allow listing users by email
* Add alternative hybrid backends for assignment and identity
(bnc#897744)
* Add workaround to support tox 1.7.2.
Security Issues:
* CVE-2014-3621
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3621>
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Cloud 4:
zypper in -t patch sleclo40sp3-openstack-keystone-9803
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Cloud 4 (x86_64) [New Version: 2014.1.3.dev18.g878f12e]:
openstack-keystone-2014.1.3.dev18.g878f12e-0.7.1
python-keystone-2014.1.3.dev18.g878f12e-0.7.1
- SUSE Cloud 4 (noarch) [New Version: 2014.1.3.dev18.g878f12e]:
openstack-keystone-doc-2014.1.3.dev18.g878f12e-0.7.1
References:
http://support.novell.com/security/cve/CVE-2014-3621.html
https://bugzilla.suse.com/show_bug.cgi?id=895847
https://bugzilla.suse.com/show_bug.cgi?id=897467
https://bugzilla.suse.com/show_bug.cgi?id=897744
https://bugzilla.suse.com/show_bug.cgi?id=897815
http://download.suse.com/patch/finder/?keywords=06409b3a52776d0d0f35109f5c0ef16e
More information about the sle-security-updates
mailing list