News

Tuesday, November 26, 2013

ubuntu-security-announce Digest, Vol 110, Issue 13

Send ubuntu-security-announce mailing list submissions to
ubuntu-security-announce@lists.ubuntu.com

To subscribe or unsubscribe via the World Wide Web, visit
https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
or, via email, send a message with subject or body 'help' to
ubuntu-security-announce-request@lists.ubuntu.com

You can reach the person managing the list at
ubuntu-security-announce-owner@lists.ubuntu.com

When replying, please edit your Subject line so it is more specific
than "Re: Contents of ubuntu-security-announce digest..."


Today's Topics:

1. [USN-2034-1] OpenStack Keystone vulnerability (Jamie Strandboge)


----------------------------------------------------------------------

Message: 1
Date: Mon, 25 Nov 2013 15:01:56 -0600
From: Jamie Strandboge <jamie@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Subject: [USN-2034-1] OpenStack Keystone vulnerability
Message-ID: <5293BAC4.20407@canonical.com>
Content-Type: text/plain; charset="utf-8"


==========================================================================
Ubuntu Security Notice USN-2034-1
November 25, 2013

keystone vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 13.10
- Ubuntu 13.04
- Ubuntu 12.10

Summary:

Keystone would improperly remove roles when it was configured to use the
LDAP backend.

Software Description:
- keystone: OpenStack identity service

Details:

Brant Knudson discovered a logic error in the LDAP backend in Keystone
where removing a role on a tenant for a user who does not have that role
would instead add the role to the user. An authenticated user could use
this to gain privileges. Ubuntu is not configured to use the LDAP Keystone
backend by default.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 13.10:
python-keystone 1:2013.2-0ubuntu1.1

Ubuntu 13.04:
python-keystone 1:2013.1.4-0ubuntu1.1

Ubuntu 12.10:
python-keystone 2012.2.4-0ubuntu3.3

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2034-1
CVE-2013-4477

Package Information:
https://launchpad.net/ubuntu/+source/keystone/1:2013.2-0ubuntu1.1
https://launchpad.net/ubuntu/+source/keystone/1:2013.1.4-0ubuntu1.1
https://launchpad.net/ubuntu/+source/keystone/2012.2.4-0ubuntu3.3




-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 901 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20131125/d66013c7/attachment-0001.pgp>

------------------------------

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce


End of ubuntu-security-announce Digest, Vol 110, Issue 13
*********************************************************

No comments:

Blog Archive