{"id":"USN-2247-1","summary":"nova vulnerabilities","details":"Darragh O'Reilly discovered that the Ubuntu packaging for OpenStack Nova\ndid not properly set up its sudo configuration. If a different flaw was\nfound in OpenStack Nova, this vulnerability could be used to escalate\nprivileges. This issue only affected Ubuntu 13.10 and Ubuntu 14.04 LTS.\n(CVE-2013-1068)\n\nBernhard M. Wiedemann and Pedraig Brady discovered that OpenStack Nova did\nnot properly verify the virtual size of a QCOW2 images. A remote\nauthenticated attacker could exploit this to create a denial of service via\ndisk consumption. This issue did not affect Ubuntu 14.04 LTS.\n(CVE-2013-4463, CVE-2013-4469)\n\nJuanFra Rodriguez Cardoso discovered that OpenStack Nova did not enforce\nSSL connections when Nova was configured to use QPid and qpid_protocol is\nset to 'ssl'. If a remote attacker were able to perform a machine-in-the-middle\nattack, this flaw could be exploited to view sensitive information. Ubuntu\ndoes not use QPid with Nova by default. This issue did not affect Ubuntu\n14.04 LTS. (CVE-2013-6491)\n\nLoganathan Parthipan discovered that OpenStack Nova did not properly create\nexpected files during KVM live block migration. A remote authenticated\nattacker could exploit this to obtain root disk snapshot contents via\nephemeral storage. This issue did not affect Ubuntu 14.04 LTS.\n(CVE-2013-7130)\n\nStanislaw Pitucha discovered that OpenStack Nova did not enforce the image\nformat when rescuing an instance. A remote authenticated attacker could\nexploit this to read host files. In the default installation, attackers\nwould be isolated by the libvirt guest AppArmor profile. This issue only\naffected Ubuntu 13.10. (CVE-2014-0134)\n\nMark Heckmann discovered that OpenStack Nova did not enforce RBAC policy\nwhen adding security group rules via the EC2 API. A remote authenticated\nuser could exploit this to gain unintended access to this API. This issue\nonly affected Ubuntu 13.10. (CVE-2014-0167)\n","modified":"2026-02-10T04:40:49Z","published":"2014-06-17T21:50:58Z","related":["UBUNTU-CVE-2013-1068"],"upstream":["CVE-2013-1068","CVE-2013-4463","CVE-2013-4469","CVE-2013-6491","CVE-2013-7130","CVE-2014-0167","UBUNTU-CVE-2013-1068","UBUNTU-CVE-2013-4463","UBUNTU-CVE-2013-4469","UBUNTU-CVE-2013-6491","UBUNTU-CVE-2013-7130","UBUNTU-CVE-2014-0134","UBUNTU-CVE-2014-0167"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-2247-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2013-1068"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2013-4463"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2013-4469"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2013-6491"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2013-7130"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-0134"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-0167"}],"affected":[{"package":{"name":"nova","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/nova@1:2014.1-0ubuntu1.2?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:2014.1-0ubuntu1.2"}]}],"versions":["1:2013.2~rc2-0ubuntu1","1:2013.2-0ubuntu1","1:2014.1~b1-0ubuntu1","1:2014.1~b1-0ubuntu2","1:2014.1~b2-0ubuntu3","1:2014.1~b2-0ubuntu4","1:2014.1~b3-0ubuntu1","1:2014.1~b3-0ubuntu2","1:2014.1~rc1-0ubuntu1","1:2014.1~rc2-0ubuntu1","1:2014.1-0ubuntu1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"1:2014.1-0ubuntu1.2","binary_name":"nova-ajax-console-proxy"},{"binary_version":"1:2014.1-0ubuntu1.2","binary_name":"nova-api"},{"binary_version":"1:2014.1-0ubuntu1.2","binary_name":"nova-api-ec2"},{"binary_version":"1:2014.1-0ubuntu1.2","binary_name":"nova-api-metadata"},{"binary_version":"1:2014.1-0ubuntu1.2","binary_name":"nova-api-os-compute"},{"binary_version":"1:2014.1-0ubuntu1.2","binary_name":"nova-api-os-volume"},{"binary_version":"1:2014.1-0ubuntu1.2","binary_name":"nova-baremetal"},{"binary_version":"1:2014.1-0ubuntu1.2","binary_name":"nova-cells"},{"binary_version":"1:2014.1-0ubuntu1.2","binary_name":"nova-cert"},{"binary_version":"1:2014.1-0ubuntu1.2","binary_name":"nova-common"},{"binary_version":"1:2014.1-0ubuntu1.2","binary_name":"nova-compute"},{"binary_version":"1:2014.1-0ubuntu1.2","binary_name":"nova-compute-kvm"},{"binary_version":"1:2014.1-0ubuntu1.2","binary_name":"nova-compute-libvirt"},{"binary_version":"1:2014.1-0ubuntu1.2","binary_name":"nova-compute-lxc"},{"binary_version":"1:2014.1-0ubuntu1.2","binary_name":"nova-compute-qemu"},{"binary_version":"1:2014.1-0ubuntu1.2","binary_name":"nova-compute-vmware"},{"binary_version":"1:2014.1-0ubuntu1.2","binary_name":"nova-compute-xen"},{"binary_version":"1:2014.1-0ubuntu1.2","binary_name":"nova-conductor"},{"binary_version":"1:2014.1-0ubuntu1.2","binary_name":"nova-console"},{"binary_version":"1:2014.1-0ubuntu1.2","binary_name":"nova-consoleauth"},{"binary_version":"1:2014.1-0ubuntu1.2","binary_name":"nova-network"},{"binary_version":"1:2014.1-0ubuntu1.2","binary_name":"nova-novncproxy"},{"binary_version":"1:2014.1-0ubuntu1.2","binary_name":"nova-objectstore"},{"binary_version":"1:2014.1-0ubuntu1.2","binary_name":"nova-scheduler"},{"binary_version":"1:2014.1-0ubuntu1.2","binary_name":"nova-spiceproxy"},{"binary_version":"1:2014.1-0ubuntu1.2","binary_name":"nova-volume"},{"binary_version":"1:2014.1-0ubuntu1.2","binary_name":"nova-xvpvncproxy"},{"binary_version":"1:2014.1-0ubuntu1.2","binary_name":"python-nova"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-2247-1.json","cves_map":{"cves":[{"id":"CVE-2013-1068","severity":[{"score":"medium","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:14.04:LTS"}}}],"schema_version":"1.7.3"}