Your message dated Tue, 04 Jun 2013 00:00:46 +0800
with message-id <51acbdae.5000...@debian.org>
and subject line Bug already fixed
has caused the Debian Bug report #708515,
regarding keystone: CVE-2013-2014 DoS via large POST requests
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
708515: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=708515
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: keystone
Severity: grave
Tags: security patch

Hi,
the following vulnerability was published for keystone.

CVE-2013-2014[0]:
| Concurrent requests with large POST body can crash the keystone process.
| This can be used by Malicious and lead to DOS to Cloud Service Provider.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

Upstream patch: https://review.openstack.org/#/c/22661/

Seems to be fixed for experimental in 2013.1-1.

For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2014
    http://security-tracker.debian.org/tracker/CVE-2013-2014

-- 
Nico Golde - XMPP: n...@jabber.ccc.de - GPG: 0xA0A0AAAA

Attachment: pgpSEDpNDGSAF.pgp
Description: PGP signature


--- End Message ---
--- Begin Message ---
As per TTX email, and as I already thought, this bug has already been
fixed a long time ago, so I'm closing it.

Thomas

--- End Message ---

Reply via email to