~gandelman-a/ubuntu/quantal/keystone/missing_cve_patch

« back to all changes in this revision

Viewing changes to debian/changelog

  • Committer: Adam Gandelman
  • Date: 2013-02-21 01:08:58 UTC
  • mfrom: (159.1.1 keystone)
  • Revision ID: adamg@canonical.com-20130221010858-o454m20j3xa05yz3
2012.2.3+stable-20130220-37b35328-0ubuntu1

Show diffs side-by-side

added added

removed removed

Lines of Context:
 
1
keystone (2012.2.3+stable-20130220-37b35328-0ubuntu1) quantal-proposed; urgency=low
 
2
 
 
3
  * Dropped patches, applied upstream:
 
4
    - debian/patches/CVE-2013-0282.patch: [f0b4d30]
 
5
    - debian/patches/CVE-2013-1664+1665.patch: [8a22745]
 
6
 
 
7
  * Resynchronize with stable/folsom (37b35328) (LP: #1116671):
 
8
    - [f0b4d30] EC2 authentication does not ensure user or tenant is enabled
 
9
      LP: 1121494
 
10
    - [8a22745] DoS through XML entity expansion (CVE-2013-1664) LP: 1100282
 
11
 
 
12
 -- Adam Gandelman <adamg@ubuntu.com>  Wed, 20 Feb 2013 16:32:14 -0400
 
13
 
1
14
keystone (2012.2.3+stable-20130206-82c87e56-0ubuntu1) quantal-proposed; urgency=low
2
15
 
3
16
  [ Adam Gandelman ]
18
31
 
19
32
 -- Adam Gandelman <adamg@ubuntu.com>  Wed, 06 Feb 2013 11:13:12 -0400
20
33
 
 
34
keystone (2012.2.1-0ubuntu1.2) quantal-security; urgency=low
 
35
 
 
36
  * SECURITY UPDATE: fix EC2-style authentication for disabled users
 
37
    - debian/patches/CVE-2013-0282.patch: adjust keystone/contrib/ec2/core.py
 
38
      to ensure user and tenant are enabled in EC2
 
39
    - CVE-2013-0282
 
40
    - LP: #1121494
 
41
  * SECURITY UPDATE: fix denial of service
 
42
    - debian/patches/CVE-2013-1664+1665.patch: disable XML entity parsing
 
43
    - CVE-2013-1664
 
44
    - CVE-2013-1665
 
45
    - LP: #1100279
 
46
    - LP: #1100282
 
47
 
 
48
 -- Jamie Strandboge <jamie@ubuntu.com>  Tue, 19 Feb 2013 11:48:27 -0600
 
49
 
21
50
keystone (2012.2.1-0ubuntu1.1) quantal-security; urgency=low
22
51
 
23
52
  * SECURITY UPDATE: fix token creation error handling