First published: Tue Nov 05 2013(Updated: )
The XenAPI backend in OpenStack Compute (Nova) Folsom, Grizzly, and Havana before 2013.2 does not properly apply security groups (1) when resizing an image or (2) during live migration, which allows remote attackers to bypass intended restrictions.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/nova | <12.0.0a0 | 12.0.0a0 |
OpenStack Havana | <=havana-3 | |
OpenStack Havana | =havana-1 | |
OpenStack Havana | =havana-2 | |
OpenStack Grizzly | ||
OpenStack Folsom |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-4497 is classified as a moderate severity vulnerability due to the potential for security group bypass during image resizing and live migration.
To fix CVE-2013-4497, you should upgrade your OpenStack Nova installation to version 12.0.0a0 or later.
CVE-2013-4497 affects OpenStack Compute (Nova) versions Folsom, Grizzly, and Havana before 2013.2.
The impact of CVE-2013-4497 allows remote attackers to bypass intended restrictions on security groups during certain operations.
There is no documented workaround for CVE-2013-4497; the best mitigation is to apply the patch as soon as possible.