drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in OpenStack
Name: |
Mehrere Probleme in OpenStack |
|
ID: |
USN-1734-1 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 11.10, Ubuntu 12.04 LTS, Ubuntu 12.10 |
|
Datum: |
Fr, 22. Februar 2013, 09:52 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1664
https://launchpad.net/ubuntu/+source/nova/2012.1.3+stable-20120827-4d2a4afe-0ubuntu1.2
https://launchpad.net/ubuntu/+source/nova/2012.2.1+stable-20121212-a99a802e-0ubuntu1.2 |
|
Applikationen: |
OpenStack |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --===============6684183092456930327== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="------------enig74FD17B0CE4BB7DC39F7CC97"
This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --------------enig74FD17B0CE4BB7DC39F7CC97 Content-Type: text/plain; charset=ISO-8859- Content-Transfer-Encoding: quoted-printable
========================================================================== Ubuntu Security Notice USN-1734-1 February 21, 2013
nova vulnerability ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.10 - Ubuntu 12.04 LTS - Ubuntu 11.10
Summary:
Nova could be made to crash if it received specially crafted input.
Software Description: - nova: OpenStack Compute cloud infrastructure
Details:
Joshua Harlow discovered that Nova would allow XML entity processing. A remote unauthenticated attacker could exploit this using the Nova API to cause a denial of service via resource exhaustion. (CVE-2013-1664)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 12.10: python-nova 2012.2.1+stable-20121212-a99a802e-0ubuntu1.2
Ubuntu 12.04 LTS: python-nova 2012.1.3+stable-20120827-4d2a4afe-0ubuntu1.2
Ubuntu 11.10: python-nova 2011.3-0ubuntu6.12
In general, a standard system update will make all the necessary changes.
References: http://www.ubuntu.com/usn/usn-1734-1 CVE-2013-1664
Package Information:
https://launchpad.net/ubuntu/+source/nova/2012.2.1+stable-20121212-a99a802e-0ubuntu1.2
https://launchpad.net/ubuntu/+source/nova/2012.1.3+stable-20120827-4d2a4afe-0ubuntu1.2 https://launchpad.net/ubuntu/+source/nova/2011.3-0ubuntu6.12
--------------enig74FD17B0CE4BB7DC39F7CC97 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) Comment: Using GnuPG with undefined - http://www.enigmail.net/
iQIcBAEBCgAGBQJRJoL4AAoJEFHb3FjMVZVzIe4P/2Sun5t3hoaCX8+NQ/5YmjW6 TzBwSiBQ32NO8berU6X+CZKKPWXnjTybMo5dy7akSinHJ0u8jgm19rluuGh+OdZG SlnJMLwJ3EwKpiVlZXWmrblDOEu8+ddO5E+gNG2xf8ZT7y71LVpFRKFuiVSZV/xN Aaz8lEXIx1gf+0/lW2Gcu5BSQQAwfxCO3+BlJeMOP5nJs/fWLZE92gNtordIeYzE 2ALTh6qLWnA5DfBvZhjePLXGvl/XZK9/eyw0Enb1BaeYyAF1nmxmNgewUIttb0az zNOX+2kyR7mY9YRqQzHZAm1u0Ucc/BarEAUHyxeXxJ7BbuRyArVgo9Sg+9ZwoHKb rxFkc02IoK9+o+Gp8ESm2FWF//na5Z7WneolEDJ9YiJxW4zoGRwQJX4fQnDZcyIO 4OLaQbeqoT6rsPMGbrwLRzmBHb+mhvdszimLN6ByCc/7cTyCLQ44AMmxpON+nkmN ijDRRyE/CNPehEYb17JDhSKAH/3skxspAUYhDSht1NEChSIhG2dHQxqk1mVjk79x wH1BMwk+mXA7mcnke2nCPpRO7CikOs07p4YG1rjrGv5dhqhT8hjFp9cC+AZNlwuL bP/GswOPT2RBiUhskD03qAEXfCzKyewCdvfRHSTntWptPtnRIsJsRfeeH/RBW5Uq uHtq9D0szzA803HI+dMY =Y6JY -----END PGP SIGNATURE-----
--------------enig74FD17B0CE4BB7DC39F7CC97--
--===============6684183092456930327== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
--===============6684183092456930327==--
|
|
|
|