First published: Thu Jan 19 2017(Updated: )
An information disclosure vulnerability in oslo.middleware was found. Software using the CatchError class may include sensitive values in the error message accompanying a Traceback, resulting in their disclosure. For example, complete API requests (including keystone tokens in their headers) may leak into neutron error logs. Affected versions: <=3.8.0, >=3.9.0 <=3.19.0, >=3.20.0 <=3.22.0
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/python-oslo-middleware | <3.8.1 | 3.8.1 |
redhat/python-oslo-middleware | <3.19.1 | 3.19.1 |
redhat/python-oslo-middleware | <3.23.1 | 3.23.1 |
pip/oslo-middleware | >=3.20.0<3.23.1 | 3.23.1 |
pip/oslo-middleware | >=0<3.8.1 | 3.8.1 |
pip/oslo-middleware | >=3.9.0<3.19.1 | 3.19.1 |
pip/oslo.middleware | >=3.20.0<3.23.1 | 3.23.1 |
pip/oslo.middleware | >=3.9.0<3.19.1 | 3.19.1 |
pip/oslo.middleware | <3.8.1 | 3.8.1 |
debian/python-oslo.middleware | 4.1.1-2 5.0.0-2 6.2.0-2 | |
OpenStack keystonemiddleware | <=3.8.0 | |
OpenStack keystonemiddleware | >=3.9.0<=3.19.0 | |
OpenStack keystonemiddleware | >=3.20.0<=3.23.0 | |
Ubuntu Linux | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-2592 is classified as an information disclosure vulnerability, which can expose sensitive data.
To resolve CVE-2017-2592, update to a version of oslo.middleware that is 3.8.1 or later, or 3.19.1 or later, or 3.23.1 or later depending on your package manager.
CVE-2017-2592 could expose sensitive values such as keystone tokens included in error messages.
Versions of oslo.middleware prior to 3.8.1, between 3.9.0 and 3.19.0, and between 3.20.0 and 3.23.0 are affected by CVE-2017-2592.
CVE-2017-2592 is not limited to a specific operating system, but it has been noted in software distributions like Red Hat and Debian.