SUSE Security Update: Security update for openstack-keystone ______________________________________________________________________________ Announcement ID: SUSE-SU-2014:0848-1 Rating: important References: #881977 Cross-References: CVE-2014-3476 Affected Products: SUSE Cloud 3 ______________________________________________________________________________ An update that fixes one vulnerability is now available. It includes one version update. Description: openstack-keystone was updated to version 2013.2.4.dev5.g9162837 to fix one security issue and one regular bug: * Privilege escalation through trust chained delegation. (CVE-2014-3476) * Fix invalid LDAP filter for user ID with commas. Security Issue reference: * CVE-2014-3476 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3476> Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Cloud 3: zypper in -t patch sleclo30sp3-openstack-keystone-9378 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Cloud 3 (x86_64) [New Version: 2013.2.4.dev5.g9162837]: openstack-keystone-2013.2.4.dev5.g9162837-0.7.1 python-keystone-2013.2.4.dev5.g9162837-0.7.1 - SUSE Cloud 3 (noarch) [New Version: 2013.2.4.dev5.g9162837]: openstack-keystone-doc-2013.2.4.dev5.g9162837-0.7.1 References: http://support.novell.com/security/cve/CVE-2014-3476.html https://bugzilla.novell.com/881977 http://download.suse.com/patch/finder/?keywords=7e3827dc35a978ab61c226134478... -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org For additional commands, e-mail: opensuse-security-announce+help@opensuse.org