* SECURITY UPDATE: incorrect Content-type header allowed cross-site
scripting vulnerability if an unknown API was used. (LP: #1251336)
- debian/patches/CVE-2013-1070.patch: Use Content-type text/plain to force
browsers to not render error messages as HTML.
- CVE-2013-1070
* SECURITY UPDATE: /etc/maas/txlongpoll.yaml contained a publicly readable
password. (LP: #1254034)
- debian/maas-region-controller.postinst: chown and chmod
/etc/maas/txlongpoll.yaml with correct permissions
- CVE-2013-1069
-- Seth Arnold <email address hidden> Tue, 11 Feb 2014 12:07:50 -0800
This bug was fixed in the package maas - 1.2+bzr1373+ dfsg-0ubuntu1. 2
--------------- dfsg-0ubuntu1. 2) quantal-security; urgency=low
maas (1.2+bzr1373+
* SECURITY UPDATE: incorrect Content-type header allowed cross-site patches/ CVE-2013- 1070.patch: Use Content-type text/plain to force txlongpoll. yaml contained a publicly readable maas-region- controller. postinst: chown and chmod etc/maas/ txlongpoll. yaml with correct permissions
scripting vulnerability if an unknown API was used. (LP: #1251336)
- debian/
browsers to not render error messages as HTML.
- CVE-2013-1070
* SECURITY UPDATE: /etc/maas/
password. (LP: #1254034)
- debian/
/
- CVE-2013-1069
-- Seth Arnold <email address hidden> Tue, 11 Feb 2014 12:07:50 -0800