Login
Newsletter
Werbung

Sicherheit: Denial of Service in OpenStack
Aktuelle Meldungen Distributionen
Name: Denial of Service in OpenStack
ID: USN-1831-1
Distribution: Ubuntu
Plattformen: Ubuntu 12.04 LTS, Ubuntu 12.10, Ubuntu 13.04
Datum: Fr, 17. Mai 2013, 06:32
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2096
https://launchpad.net/ubuntu/+source/nova/2012.1.3+stable-20130423-e52e6912-0ubuntu1.1
Applikationen: OpenStack

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--===============5621249668832189665==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="------------enigE320039F04DFCBD1CD142554"

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enigE320039F04DFCBD1CD142554
Content-Type: text/plain; charset=ISO-8859-
Content-Transfer-Encoding: quoted-printable


==========================================================================
Ubuntu Security Notice USN-1831-1
May 16, 2013

nova vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 13.04
- Ubuntu 12.10
- Ubuntu 12.04 LTS

Summary:

Nova could be made to crash the system if instances used a specially
crafted image.

Software Description:
- nova: OpenStack Compute cloud infrastructure

Details:

Loganathan Parthipan discovered that Nova did not verify the size of QCOW2
instance storage. An authenticated attacker could exploit this to cause a
denial of service by creating an image with a large virtual size with
little data, then filling the virtual disk.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 13.04:
python-nova 1:2013.1-0ubuntu2.1

Ubuntu 12.10:
python-nova 2012.2.3-0ubuntu2.1

Ubuntu 12.04 LTS:
python-nova
2012.1.3+stable-20130423-e52e6912-0ubuntu1.1

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-1831-1
CVE-2013-2096

Package Information:
https://launchpad.net/ubuntu/+source/nova/1:2013.1-0ubuntu2.1
https://launchpad.net/ubuntu/+source/nova/2012.2.3-0ubuntu2.1

https://launchpad.net/ubuntu/+source/nova/2012.1.3+stable-20130423-e52e6912-0ubuntu1.1





--------------enigE320039F04DFCBD1CD142554
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with undefined - http://www.enigmail.net/
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=4sf8
-----END PGP SIGNATURE-----

--------------enigE320039F04DFCBD1CD142554--


--===============5621249668832189665==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

--===============5621249668832189665==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung