First published: Wed Oct 08 2014(Updated: )
The processutils.execute function in OpenStack oslo-incubator, Cinder, Nova, and Trove before 2013.2.4 and 2014.1 before 2014.1.3 allows local users to obtain passwords from commands that cause a ProcessExecutionError by reading the log.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat OpenStack Cinder | >=2013.2<2013.2.4 | |
Red Hat OpenStack Cinder | >=2014.1<2014.1.3 | |
OpenStack Nova-LXD | >=2013.2<2013.2.4 | |
OpenStack Nova-LXD | >=2014.1<2014.1.3 | |
OpenStack Trove | >=2013.2<2013.2.4 | |
OpenStack Trove | >=2014.1<2014.1.3 | |
Red Hat OpenStack for IBM Power | =5.0 | |
Ubuntu | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-7230 is classified as a medium severity vulnerability due to its potential to expose sensitive information.
To fix CVE-2014-7230, update OpenStack components Cinder, Nova, and Trove to versions 2013.2.4 or 2014.1.3 or later.
CVE-2014-7230 exploits the processutils.execute function to allow local users to read sensitive information from logs.
CVE-2014-7230 affects OpenStack components Cinder, Nova, and Trove prior to specific patched versions.
Yes, CVE-2014-7230 can impact system security by allowing local users to access credentials through error logs.