First published: Tue Mar 26 2019(Updated: )
In a default Red Hat Openstack Platform Director installation, openstack-octavia before versions openstack-octavia 2.0.2-5 and openstack-octavia-3.0.1-0.20181009115732 creates log files that are readable by all users. Sensitive information such as private keys can appear in these log files allowing for information exposure.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/octavia | <2.1.0 | 2.1.0 |
pip/octavia | >=3.0.0.0b1<3.1.0 | 3.1.0 |
OpenStack Octavia | >=2.0.0<2.0.2-5 | |
OpenStack Octavia | >=3.0.0<3.0.1-0.20181009115732 | |
redhat openstack | =12 | |
redhat openstack | =13 | |
redhat openstack | =14 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-16856 is classified as a high severity vulnerability due to the exposure of sensitive information in log files.
To fix CVE-2018-16856, update OpenStack Octavia to version 2.1.0 or later, or 3.1.0 or later.
The vulnerable versions of OpenStack Octavia are prior to 2.0.2-5 and prior to 3.0.1-0.20181009115732.
CVE-2018-16856 can expose sensitive information such as private keys through readable log files.
Red Hat OpenStack versions 12, 13, and 14 are affected by CVE-2018-16856.