Login


 
Newsletter
Werbung
Sicherheit: Mehrere Probleme in OpenStack
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in OpenStack
ID: USN-1734-1
Distribution: Ubuntu
Plattformen: Ubuntu 11.10, Ubuntu 12.04 LTS, Ubuntu 12.10
Datum: Fr, 22. Februar 2013, 09:52
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1664
https://launchpad.net/ubuntu/+source/nova/2012.1.3+stable-20120827-4d2a4afe-0ubuntu1.2
https://launchpad.net/ubuntu/+source/nova/2012.2.1+stable-20121212-a99a802e-0ubuntu1.2

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--===============6684183092456930327==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="------------enig74FD17B0CE4BB7DC39F7CC97"

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enig74FD17B0CE4BB7DC39F7CC97
Content-Type: text/plain; charset=ISO-8859-
Content-Transfer-Encoding: quoted-printable


==========================================================================
Ubuntu Security Notice USN-1734-1
February 21, 2013

nova vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 12.10
- Ubuntu 12.04 LTS
- Ubuntu 11.10

Summary:

Nova could be made to crash if it received specially crafted input.

Software Description:
- nova: OpenStack Compute cloud infrastructure

Details:

Joshua Harlow discovered that Nova would allow XML entity processing. A
remote unauthenticated attacker could exploit this using the Nova API to
cause a denial of service via resource exhaustion. (CVE-2013-1664)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.10:
python-nova
2012.2.1+stable-20121212-a99a802e-0ubuntu1.2

Ubuntu 12.04 LTS:
python-nova
2012.1.3+stable-20120827-4d2a4afe-0ubuntu1.2

Ubuntu 11.10:
python-nova 2011.3-0ubuntu6.12

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-1734-1
CVE-2013-1664

Package Information:

https://launchpad.net/ubuntu/+source/nova/2012.2.1+stable-20121212-a99a802e-0ubuntu1.2

https://launchpad.net/ubuntu/+source/nova/2012.1.3+stable-20120827-4d2a4afe-0ubuntu1.2
https://launchpad.net/ubuntu/+source/nova/2011.3-0ubuntu6.12





--------------enig74FD17B0CE4BB7DC39F7CC97
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with undefined - http://www.enigmail.net/

iQIcBAEBCgAGBQJRJoL4AAoJEFHb3FjMVZVzIe4P/2Sun5t3hoaCX8+NQ/5YmjW6
TzBwSiBQ32NO8berU6X+CZKKPWXnjTybMo5dy7akSinHJ0u8jgm19rluuGh+OdZG
SlnJMLwJ3EwKpiVlZXWmrblDOEu8+ddO5E+gNG2xf8ZT7y71LVpFRKFuiVSZV/xN
Aaz8lEXIx1gf+0/lW2Gcu5BSQQAwfxCO3+BlJeMOP5nJs/fWLZE92gNtordIeYzE
2ALTh6qLWnA5DfBvZhjePLXGvl/XZK9/eyw0Enb1BaeYyAF1nmxmNgewUIttb0az
zNOX+2kyR7mY9YRqQzHZAm1u0Ucc/BarEAUHyxeXxJ7BbuRyArVgo9Sg+9ZwoHKb
rxFkc02IoK9+o+Gp8ESm2FWF//na5Z7WneolEDJ9YiJxW4zoGRwQJX4fQnDZcyIO
4OLaQbeqoT6rsPMGbrwLRzmBHb+mhvdszimLN6ByCc/7cTyCLQ44AMmxpON+nkmN
ijDRRyE/CNPehEYb17JDhSKAH/3skxspAUYhDSht1NEChSIhG2dHQxqk1mVjk79x
wH1BMwk+mXA7mcnke2nCPpRO7CikOs07p4YG1rjrGv5dhqhT8hjFp9cC+AZNlwuL
bP/GswOPT2RBiUhskD03qAEXfCzKyewCdvfRHSTntWptPtnRIsJsRfeeH/RBW5Uq
uHtq9D0szzA803HI+dMY
=Y6JY
-----END PGP SIGNATURE-----

--------------enig74FD17B0CE4BB7DC39F7CC97--


--===============6684183092456930327==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

--===============6684183092456930327==--
Pro-Linux
Pro-Linux @Twitter
Neue Nachrichten
Werbung