RHEL 7 : openstack-trove (RHSA-2014:1939)

medium Nessus Plugin ID 193839

Synopsis

The remote Red Hat host is missing one or more security updates for openstack-trove.

Description

The remote Redhat Enterprise Linux 7 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2014:1939 advisory.

OpenStack Database (trove) is Database as a Service for Openstack. It runs entirely on OpenStack, with the goal of allowing users to quickly and easily utilize the features of a database without the burden of handling complex administrative tasks. Cloud users and database administrators can provision and manage multiple database instances as needed.

It was found that the processutils.execute() and strutils.mask_password() functions did not correctly sanitize the authentication details from their output before storing them in log files. This could allow an attacker with read access to these log files to obtain sensitive information such as passwords. (CVE-2014-7230, CVE-2014-7231)

The openstack-trove packages have been upgraded to upstream version 2014.1.3, which provides a number of bug fixes and enhancements over the previous version. (BZ#1149745)

All openstack-trove users are advised to upgrade to these updated packages, which correct these issues and add these enhancements.

Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the RHEL openstack-trove package based on the guidance in RHSA-2014:1939.

See Also

https://access.redhat.com/security/updates/classification/#low

https://bugzilla.redhat.com/show_bug.cgi?id=1147722

https://bugzilla.redhat.com/show_bug.cgi?id=1149745

http://www.nessus.org/u?8edd81b1

https://access.redhat.com/errata/RHSA-2014:1939

Plugin Details

Severity: Medium

ID: 193839

File Name: redhat-RHSA-2014-1939.nasl

Version: 1.1

Type: local

Agent: unix

Published: 4/24/2024

Updated: 6/3/2024

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.8

Vendor

Vendor Severity: Low

CVSS v2

Risk Factor: Low

Base Score: 2.1

Temporal Score: 1.6

Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:N

CVSS Score Source: CVE-2014-7231

CVSS v3

Risk Factor: Medium

Base Score: 5.5

Temporal Score: 5

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

CVSS Score Source: CVE-2014-7230

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:python-trove, cpe:/o:redhat:enterprise_linux:7, p-cpe:/a:redhat:enterprise_linux:openstack-trove-guestagent, p-cpe:/a:redhat:enterprise_linux:openstack-trove-api, p-cpe:/a:redhat:enterprise_linux:openstack-trove-conductor, p-cpe:/a:redhat:enterprise_linux:openstack-trove, p-cpe:/a:redhat:enterprise_linux:openstack-trove-taskmanager, p-cpe:/a:redhat:enterprise_linux:openstack-trove-common

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 12/2/2014

Vulnerability Publication Date: 9/29/2014

Reference Information

CVE: CVE-2014-7230, CVE-2014-7231

CWE: 522

RHSA: 2014:1939