Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2013:1199 - Security Advisory
Issued:
2013-09-03
Updated:
2013-09-03

RHSA-2013:1199 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: openstack-nova security and bug fix update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated openstack-nova packages that fix multiple security issues and
various bugs are now available for Red Hat OpenStack 3.0.

The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

Description

The openstack-nova packages provide OpenStack Compute (Nova), which
provides services for provisioning, managing, and using virtual machine
instances.

It was found that the fixes for CVE-2013-1664 and CVE-2013-1665, released
via RHSA-2013:0657, did not fully correct the issues in the Extensible
Markup Language (XML) parser used by Nova. A remote attacker could use
this flaw to send a specially-crafted request to a Nova API, causing
Nova to consume an excessive amount of CPU and memory, or possibly crash.
(CVE-2013-4179)

A denial of service flaw was found in the way Nova handled network source
security group policy updates. An authenticated user could send a large
number of server creation operations, causing nova-network to become
unresponsive. (CVE-2013-4185)

An information disclosure flaw and a resource limit bypass were found in
the way Nova handled virtual hardware templates (flavors). These allowed
tenants to show and boot other tenants' flavors and bypass resource limits
enforced via the os-flavor-access:is_public property. (CVE-2013-2256)

It was discovered that, in some configurations, certain messages in
console-log could cause nova-compute to become unresponsive, resulting in a
denial of service. (CVE-2013-4261)

Red Hat would like to thank the OpenStack project for reporting
CVE-2013-2256 and CVE-2013-4185. Upstream acknowledges hzrandd from NetEase
as the original reporter of CVE-2013-2256, and Vishvananda Ishaya
from Nebula as the original reporter of CVE-2013-4185. Upstream also
acknowledges Ken'ichi Ohmichi from NEC for providing a corrected fix for
CVE-2013-2256.

The CVE-2013-4179 issue was discovered by Grant Murphy of the Red Hat
Product Security Team, and CVE-2013-4261 was discovered by Jaroslav Henner
of Red Hat.

This update also fixes a number of bugs in openstack-nova.

Additionally, openstack-nova has been rebased to the latest stable release
2013.1.3. (BZ#993100)

All users of openstack-nova are advised to upgrade to these updated
packages, which correct these issues. After installing the updated
packages, the running Nova services will be restarted automatically.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258

Affected Products

  • Red Hat OpenStack grizzly x86_64

Fixes

  • BZ - 971188 - Console log lacks dashes.
  • BZ - 975882 - Nova doesn't close qpid connections after certain error conditions
  • BZ - 989707 - CVE-2013-4179 OpenStack: Nova XML entities DoS
  • BZ - 993331 - CVE-2013-4185 OpenStack: Nova network source security groups denial of service
  • BZ - 993340 - CVE-2013-2256 OpenStack: Nova private flavors resource limit circumvention
  • BZ - 997649 - config_drive_cdrom not effective
  • BZ - 997840 - live block migration stopped working, claiming DestinationDiskExists
  • BZ - 998598 - nova interface-attach fails with HTTP 400; TypeError: get_config() takes exactly 6 arguments...
  • BZ - 999271 - CVE-2013-4261 OpenStack: openstack-nova-compute console-log DoS

CVEs

  • CVE-2013-2256
  • CVE-2013-4261
  • CVE-2013-4179
  • CVE-2013-4185

References

  • https://access.redhat.com/security/updates/classification/#moderate
  • https://rhn.redhat.com/errata/RHSA-2013-0657.html
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat OpenStack grizzly

SRPM
openstack-nova-2013.1.3-3.el6ost.src.rpm SHA-256: f50f21a099981e82c21bf3784f73f9a8dcd23208b5f491e686998ce6d969bc7b
x86_64
openstack-nova-2013.1.3-3.el6ost.noarch.rpm SHA-256: 6dbb2bd3508642df6526e174f3422f727d1de7ec618258ffc787a2ee97869a07
openstack-nova-api-2013.1.3-3.el6ost.noarch.rpm SHA-256: 6be67a282ef831f941f14a937968e97fdd2448a9e37df655c6eaca54813545f8
openstack-nova-cells-2013.1.3-3.el6ost.noarch.rpm SHA-256: 7206b77b43bb7bbc6c9db8a42efda87e5fcf25f32460e633cecdefed1dfd2469
openstack-nova-cert-2013.1.3-3.el6ost.noarch.rpm SHA-256: e790bfa7bec9b780ea775cc7e4ac9c15dbde3243199cb241949b5f80ff29db3f
openstack-nova-common-2013.1.3-3.el6ost.noarch.rpm SHA-256: 59ec6dd1bc045f7005bcf8547a7025b123a032955ace73785d4e31b32e1c32d9
openstack-nova-compute-2013.1.3-3.el6ost.noarch.rpm SHA-256: 75829cba77c297727eb9312a152865aeaa7d076fca65711efff96ca8bb0cff24
openstack-nova-conductor-2013.1.3-3.el6ost.noarch.rpm SHA-256: 5820adbc437b867843648319170e21d2726603996c506c4a3b4f077c59ca8eaa
openstack-nova-console-2013.1.3-3.el6ost.noarch.rpm SHA-256: 843f7f881a37c8a54500954d456ba7982417c05f078b75e3065b45b99e34fb94
openstack-nova-doc-2013.1.3-3.el6ost.noarch.rpm SHA-256: f2ac80658c0164e4fb132c4512f7dade18c058060e78419271ae5f2362130fc2
openstack-nova-network-2013.1.3-3.el6ost.noarch.rpm SHA-256: ca4cb13a8287ecf5328d306366bc3481913f38875530abd0b6e1a8cd30ad20e6
openstack-nova-objectstore-2013.1.3-3.el6ost.noarch.rpm SHA-256: 521976ef0d0a9d687f9b1b3132d1948849db890ebfd631ef6482564d97d74d68
openstack-nova-scheduler-2013.1.3-3.el6ost.noarch.rpm SHA-256: c540dffeef2052ee2bbb74df2e14a997a640e2c4ba7952d068b3f672717c1e9b
python-nova-2013.1.3-3.el6ost.noarch.rpm SHA-256: 280ab74a1b86cf9f2b7c2972f34a6eaaf339f4d11381ad1a0c06277c5feee129

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility