Login
Newsletter
Werbung

Sicherheit: Mangelnde Rechteprüfung in OpenStack
Aktuelle Meldungen Distributionen
Name: Mangelnde Rechteprüfung in OpenStack
ID: USN-1710-1
Distribution: Ubuntu
Plattformen: Ubuntu 11.10, Ubuntu 12.04 LTS, Ubuntu 12.10
Datum: Mi, 30. Januar 2013, 08:41
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0212
https://launchpad.net/ubuntu/+source/glance/2012.1.3+stable~20120821-120fcf-0ubuntu1.3
Applikationen: OpenStack

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--===============2633238582241838980==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="------------enig5DCA466C07A9B46B896CBE78"

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enig5DCA466C07A9B46B896CBE78
Content-Type: text/plain; charset=ISO-8859-
Content-Transfer-Encoding: quoted-printable


==========================================================================
Ubuntu Security Notice USN-1710-1
January 29, 2013

glance vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 12.10
- Ubuntu 12.04 LTS
- Ubuntu 11.10

Summary:

Glance could be made to expose sensitive information over the network.

Software Description:
- glance: OpenStack Image Registry and Delivery Service

Details:

Dan Prince discovered an issue in Glance error reporting. An authenticated
attacker could exploit this to expose the Glance operator's Swift
credentials for a misconfigured or otherwise unusable Swift endpoint.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.10:
python-glance 2012.2.1-0ubuntu1.1

Ubuntu 12.04 LTS:
python-glance 2012.1.3+stable~20120821-120fcf-0ubuntu1.3

Ubuntu 11.10:
python-glance 2011.3-0ubuntu4.2

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-1710-1
CVE-2013-0212

Package Information:
https://launchpad.net/ubuntu/+source/glance/2012.2.1-0ubuntu1.1

https://launchpad.net/ubuntu/+source/glance/2012.1.3+stable~20120821-120fcf-0ubuntu1.3
https://launchpad.net/ubuntu/+source/glance/2011.3-0ubuntu4.2





--------------enig5DCA466C07A9B46B896CBE78
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with undefined - http://www.enigmail.net/
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=PyGe
-----END PGP SIGNATURE-----

--------------enig5DCA466C07A9B46B896CBE78--


--===============2633238582241838980==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

--===============2633238582241838980==--
Pro-Linux
Gewinnspiel
Neue Nachrichten
Werbung