Wednesday, February 20, 2013

[USN-1731-1] OpenStack Cinder vulnerability

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with undefined - http://www.enigmail.net/
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=AV74
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-1731-1
February 21, 2013

cinder vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 12.10

Summary:

Cinder could be made to crash if it received specially crafted input.

Software Description:
- cinder: Cinder storage service - api server

Details:

Stuart Stent discovered that Cinder would allow XML entity processing. A
remote unauthenticated attacker could exploit this using the Cinder API to
cause a denial of service via resource exhaustion. (CVE-2013-1664)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.10:
python-cinder 2012.2.1-0ubuntu1.1

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-1731-1
CVE-2013-1664

Package Information:
https://launchpad.net/ubuntu/+source/cinder/2012.2.1-0ubuntu1.1

No comments:

Post a Comment