[Openstack] [OSSA 2014-036] Potential leak of passwords into log files (CVE-2014-7230, CVE-2014-7231)

Tristan Cacqueray tristan.cacqueray at enovance.com
Wed Oct 15 18:06:10 UTC 2014


OpenStack Security Advisory: 2014-036
CVE: CVE-2014-7230, CVE-2014-7231
Date: October 15, 2014
Title: Potential leak of passwords into log files
Reporter: Amrith Kumar (Tesora)
Products: Cinder and Nova (versions up to 2014.1.3)
                    Trove (versions up to 2014.1.2)

Description:
Amrith Kumar from Tesora reported two vulnerabilities in the
processutils.execute() and strutils.mask_password() functions available
from oslo-incubator that are copied into each project's code. An
attacker with read access to the services' logs may obtain passwords
used as a parameter of a command that has failed (CVE-2014-7230) or when
mask_password did not mask passwords properly (CVE-2014-7231). All
Cinder, Nova and Trove setups are affected.

Kilo (development branch) fixes:
https://review.openstack.org/116927 (Cinder)
https://review.openstack.org/126052 (Cinder ssh_execute)
https://review.openstack.org/116982 (Nova)
https://review.openstack.org/126047 (Nova   ssh_execute)
https://review.openstack.org/121417 (Trove)

Juno (proposed branch) fixes:
https://review.openstack.org/126594 (Nova   ssh_execute)
https://review.openstack.org/126592 (Cinder ssh_execute)

Icehouse fixes:
https://review.openstack.org/121382 (Cinder)
https://review.openstack.org/126665 (Cinder ssh_execute)
https://review.openstack.org/121096 (Nova)
https://review.openstack.org/126699 (Nova   ssh_execute)
https://review.openstack.org/121416 (Trove)

Notes:
The former patch did not cover the ssh_execute method used in Nova and
Cinder, thus two more patches are required for these projects.
Nova and Cinder fixes are included in the 2014.2rc2 release candidate
and will appear in a future 2014.1.4 release.
Trove fix was included in the 2014.2rc1 release candidate and 2014.1.3
release.

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7230
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7231
https://launchpad.net/bugs/1377981
https://launchpad.net/bugs/1343604
https://launchpad.net/bugs/1345233

-- 
Tristan Cacqueray
OpenStack Vulnerability Management Team

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 473 bytes
Desc: OpenPGP digital signature
URL: <http://lists.openstack.org/pipermail/openstack/attachments/20141015/2a7358c4/attachment.sig>


More information about the Openstack mailing list