====================================================================                   Red Hat Security Advisory

Synopsis:          Low: openstack-trove security update
Advisory ID:       RHSA-2014:1939-01
Product:           Red Hat Enterprise Linux OpenStack Platform
Advisory URL:      https://access.redhat.com/errata/RHSA-2014:1939.html
Issue date:        2014-12-02
CVE Names:         CVE-2014-7230 CVE-2014-7231 
====================================================================
1. Summary:

Updated openstack-trove packages that fix two security issues are now
available for Red Hat Enterprise Linux OpenStack Platform 5.0 for Red Hat
Enterprise Linux 7.

Red Hat Product Security has rated this update as having Low security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux OpenStack Platform 5.0 for RHEL 7 - noarch

3. Description:

OpenStack Database (trove) is Database as a Service for Openstack. It runs
entirely on OpenStack, with the goal of allowing users to quickly and
easily utilize the features of a database without the burden of handling
complex administrative tasks. Cloud users and database administrators can
provision and manage multiple database instances as needed.

It was found that the processutils.execute() and strutils.mask_password()
functions did not correctly sanitize the authentication details from their
output before storing them in log files. This could allow an attacker with
read access to these log files to obtain sensitive information such as
passwords. (CVE-2014-7230, CVE-2014-7231)

The openstack-trove packages have been upgraded to upstream version
2014.1.3, which provides a number of bug fixes and enhancements over the
previous version. (BZ#1149745)

All openstack-trove users are advised to upgrade to these updated packages,
which correct these issues and add these enhancements.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1147722 - CVE-2014-7230 CVE-2014-7231 OpenStack Cinder, Nova, Trove: potential leak of passwords into log files
1149745 - Rebase openstack-trove to 2014.1.3

6. Package List:

Red Hat Enterprise Linux OpenStack Platform 5.0 for RHEL 7:

Source:
openstack-trove-2014.1.3-1.el7ost.src.rpm

noarch:
openstack-trove-2014.1.3-1.el7ost.noarch.rpm
openstack-trove-api-2014.1.3-1.el7ost.noarch.rpm
openstack-trove-common-2014.1.3-1.el7ost.noarch.rpm
openstack-trove-conductor-2014.1.3-1.el7ost.noarch.rpm
openstack-trove-guestagent-2014.1.3-1.el7ost.noarch.rpm
openstack-trove-taskmanager-2014.1.3-1.el7ost.noarch.rpm
python-trove-2014.1.3-1.el7ost.noarch.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2014-7230
https://access.redhat.com/security/cve/CVE-2014-7231
https://access.redhat.com/security/updates/classification/#low

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2014 Red Hat, Inc.

Red Hat: 2014:1939-01: openstack-trove: Low Advisory

Updated openstack-trove packages that fix two security issues are now available for Red Hat Enterprise Linux OpenStack Platform 5.0 for Red Hat Enterprise Linux 7

Summary

OpenStack Database (trove) is Database as a Service for Openstack. It runs entirely on OpenStack, with the goal of allowing users to quickly and easily utilize the features of a database without the burden of handling complex administrative tasks. Cloud users and database administrators can provision and manage multiple database instances as needed.
It was found that the processutils.execute() and strutils.mask_password() functions did not correctly sanitize the authentication details from their output before storing them in log files. This could allow an attacker with read access to these log files to obtain sensitive information such as passwords. (CVE-2014-7230, CVE-2014-7231)
The openstack-trove packages have been upgraded to upstream version 2014.1.3, which provides a number of bug fixes and enhancements over the previous version. (BZ#1149745)
All openstack-trove users are advised to upgrade to these updated packages, which correct these issues and add these enhancements.



Summary


Solution

Before applying this update, make sure all previously released errata relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/articles/11258

References

https://access.redhat.com/security/cve/CVE-2014-7230 https://access.redhat.com/security/cve/CVE-2014-7231 https://access.redhat.com/security/updates/classification/#low

Package List

Red Hat Enterprise Linux OpenStack Platform 5.0 for RHEL 7:
Source: openstack-trove-2014.1.3-1.el7ost.src.rpm
noarch: openstack-trove-2014.1.3-1.el7ost.noarch.rpm openstack-trove-api-2014.1.3-1.el7ost.noarch.rpm openstack-trove-common-2014.1.3-1.el7ost.noarch.rpm openstack-trove-conductor-2014.1.3-1.el7ost.noarch.rpm openstack-trove-guestagent-2014.1.3-1.el7ost.noarch.rpm openstack-trove-taskmanager-2014.1.3-1.el7ost.noarch.rpm python-trove-2014.1.3-1.el7ost.noarch.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/


Severity
Advisory ID: RHSA-2014:1939-01
Product: Red Hat Enterprise Linux OpenStack Platform
Advisory URL: https://access.redhat.com/errata/RHSA-2014:1939.html
Issued Date: : 2014-12-02
CVE Names: CVE-2014-7230 CVE-2014-7231

Topic

Updated openstack-trove packages that fix two security issues are nowavailable for Red Hat Enterprise Linux OpenStack Platform 5.0 for Red HatEnterprise Linux 7.Red Hat Product Security has rated this update as having Low securityimpact. Common Vulnerability Scoring System (CVSS) base scores, which givedetailed severity ratings, are available for each vulnerability from theCVE links in the References section.


Topic


 

Relevant Releases Architectures

Red Hat Enterprise Linux OpenStack Platform 5.0 for RHEL 7 - noarch


Bugs Fixed

1147722 - CVE-2014-7230 CVE-2014-7231 OpenStack Cinder, Nova, Trove: potential leak of passwords into log files

1149745 - Rebase openstack-trove to 2014.1.3


Related News