Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Mon, 15 Sep 2014 13:34:34 -0400 (EDT)
From: cve-assign@...re.org
To: gmurphy@...hat.com
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE request for vulnerability in OpenStack Neutron

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> https://launchpad.net/bugs/1357379
> 
> Admin-only network attributes may be reset to defaults by
> non-privileged users
> 
> may lead to unexpected behavior with security implications for
> operators with a custom policy.json, or in some extreme cases network
> outages

Use CVE-2014-6414.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJUFyLSAAoJEKllVAevmvms7A0H/i8ej5/rLZXsS6yGvj/p1Ema
YIlA2ap2WyAxjTVPM0bt9p+OgMLELSWxd0ol7JFBoV7wNd1WvJvpB51tNJqp+KBY
rOcW1VR2Chrhyjabw1LmfOcl+v3nKq7FTo7Iuw5DnT+qcLHrBztHZYUIG7vQC2Fc
airHA2tIGcgI8DgDqgJnHssM29zpMtH5nFlT7DMwxuqj8BH04FSaebyBXTtvSXjU
cS3Da5DF9M2slSDd1oWjRI8VVCYVJF3vttj8gC+NUAmCkYhvu0VmN/PxQwXbi4Lf
t7UvaPMiJkRbUsELrBQxXwm+QW+NIXwicJxkbL7FamIf3C/eg0Jw6aSTVuD22ZQ=
=qc6q
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ