Send ubuntu-security-announce mailing list submissions to
ubuntu-security-announce@lists.ubuntu.com
To subscribe or unsubscribe via the World Wide Web, visit
https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
or, via email, send a message with subject or body 'help' to
ubuntu-security-announce-request@lists.ubuntu.com
You can reach the person managing the list at
ubuntu-security-announce-owner@lists.ubuntu.com
When replying, please edit your Subject line so it is more specific
than "Re: Contents of ubuntu-security-announce digest..."
Today's Topics:
1. [USN-2248-1] OpenStack Cinder vulnerability (Jamie Strandboge)
2. [USN-2249-1] OpenStack Heat vulnerability (Jamie Strandboge)
----------------------------------------------------------------------
Message: 1
Date: Wed, 18 Jun 2014 12:50:44 -0500
From: Jamie Strandboge <jamie@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Subject: [USN-2248-1] OpenStack Cinder vulnerability
Message-ID: <53A1D174.1000804@canonical.com>
Content-Type: text/plain; charset="utf-8"
==========================================================================
Ubuntu Security Notice USN-2248-1
June 18, 2014
cinder vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 LTS
- Ubuntu 13.10
Summary:
OpenStack Cinder could be made to run programs as an administrator under
certain conditions.
Software Description:
- cinder: OpenStack storage service
Details:
Darragh O'Reilly discovered that the Ubuntu packaging for OpenStack Cinder
did not properly set up its sudo configuration. If a different flaw was
found in OpenStack Cinder, this vulnerability could be used to escalate
privileges. (CVE-2013-1068)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 LTS:
python-cinder 1:2014.1-0ubuntu1.1
Ubuntu 13.10:
python-cinder 1:2013.2.3-0ubuntu1.1
In general, a standard system update will make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2248-1
CVE-2013-1068
Package Information:
https://launchpad.net/ubuntu/+source/cinder/1:2014.1-0ubuntu1.1
https://launchpad.net/ubuntu/+source/cinder/1:2013.2.3-0ubuntu1.1
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 884 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20140618/ff0d3124/attachment-0001.pgp>
------------------------------
Message: 2
Date: Wed, 18 Jun 2014 15:56:24 -0500
From: Jamie Strandboge <jamie@canonical.com>
To: ubuntu-security-announce@lists.ubuntu.com
Subject: [USN-2249-1] OpenStack Heat vulnerability
Message-ID: <53A1FCF8.3010408@canonical.com>
Content-Type: text/plain; charset="utf-8"
==========================================================================
Ubuntu Security Notice USN-2249-1
June 18, 2014
heat vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 LTS
Summary:
OpenStack Heat would expose sensitive information over the network.
Software Description:
- heat: OpenStack Orchestration Service
Details:
Jason Dunsmore discovered that OpenStack heat did not properly restrict
access to template information. A remote authenticated attacker could
exploit this to see URL provider templates of other tenants for a limited
time.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 LTS:
python-heat 2014.1-0ubuntu1.1
In general, a standard system update will make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2249-1
CVE-2014-3801
Package Information:
https://launchpad.net/ubuntu/+source/heat/2014.1-0ubuntu1.1
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 884 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20140618/054fe416/attachment-0001.pgp>
------------------------------
--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
End of ubuntu-security-announce Digest, Vol 117, Issue 10
*********************************************************
News
Subscribe to:
Post Comments (Atom)
Blog Archive
-
▼
2014
(407)
-
▼
June
(21)
- ubuntu-security-announce Digest, Vol 117, Issue 16
- ubuntu-security-announce Digest, Vol 117, Issue 15
- ubuntu-security-announce Digest, Vol 117, Issue 14
- Microsoft Releases Microsoft Update Client for All...
- ubuntu-security-announce Digest, Vol 117, Issue 13
- ubuntu-security-announce Digest, Vol 117, Issue 12
- ubuntu-security-announce Digest, Vol 117, Issue 11
- ubuntu-security-announce Digest, Vol 117, Issue 10
- ubuntu-security-announce Digest, Vol 117, Issue 9
- See where your customers are coming from and where...
- ubuntu-security-announce Digest, Vol 117, Issue 8
- ubuntu-security-announce Digest, Vol 117, Issue 7
- Severe New OpenSSL Vulnerability Reported
- ubuntu-security-announce Digest, Vol 117, Issue 6
- PLEASE OPEN YOU ATTACHMENT AND GET BACK TO ME THANKS
- ubuntu-security-announce Digest, Vol 117, Issue 5
- Collaborate smarter by giving colleagues access to...
- ubuntu-security-announce Digest, Vol 117, Issue 4
- ubuntu-security-announce Digest, Vol 117, Issue 3
- ubuntu-security-announce Digest, Vol 117, Issue 2
- ubuntu-security-announce Digest, Vol 117, Issue 1
-
▼
June
(21)
No comments:
Post a Comment