CVE-2014-3632

NameCVE-2014-3632
DescriptionThe default configuration in a sudoers file in the Red Hat openstack-neutron package before 2014.1.2-4, as used in Red Hat Enterprise Linux Open Stack Platform 5.0 for Red Hat Enterprise Linux 6, allows remote attackers to gain privileges via a crafted configuration file. NOTE: this vulnerability exists because of a CVE-2013-6433 regression.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severityhigh

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
neutron (PTS)jessie2014.1.3-12fixed
stretch2:9.1.1-3+deb9u1fixed
stretch (security)2:9.1.1-3+deb9u2fixed
buster2:13.0.2-15fixed
buster (security)2:13.0.7+git.2021.09.27.bace3d1890-0+deb10u1fixed
bullseye2:17.1.1-6fixed
bullseye (security)2:17.2.1-0+deb11u1fixed
sid, bookworm2:19.0.0-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
neutronsource(unstable)(not affected)

Notes

- neutron <not-affected> (Red Hat-specific)
Regression of fix for CVE-2013-6433, Red Hat specific in RedHat Enterprise Open Stack Platform 5.0

Search for package or bug name: Reporting problems