Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 606976 (CVE-2017-2592) - <dev-python/oslo-middleware-{3.8.0-r2,3.19.0-r1}: CatchErrors leaks sensitive values in oslo.middleware
Summary: <dev-python/oslo-middleware-{3.8.0-r2,3.19.0-r1}: CatchErrors leaks sensitive...
Status: RESOLVED FIXED
Alias: CVE-2017-2592
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL: http://seclists.org/oss-sec/2017/q1/205
Whiteboard: B3 [noglsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2017-01-24 02:36 UTC by Aaron Bauman (RETIRED)
Modified: 2017-01-26 22:41 UTC (History)
8 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Aaron Bauman (RETIRED) gentoo-dev 2017-01-24 02:36:38 UTC
This is an advance warning of a vulnerability discovered in
OpenStack, to give you, as downstream stakeholders, a chance to
coordinate the release of fixes and reduce the vulnerability window.
Please treat the following information as confidential until the
proposed public disclosure date.

Title: CatchErrors leaks sensitive values in oslo.middleware
Reporter: Divya K Konoor (IBM)
Products: oslo.middleware
Affects: <=3.8.0, >=3.9.0 <=3.19.0, >=3.20.0 <=3.23.0

Description:
Divya K Konoor with IBM reported a vulnerability in oslo.middleware.
Software using the CatchError class may include sensitive values in
the error message accompanying a Traceback, resulting in their
disclosure. For example, complete API requests (including keystone
tokens in their headers) may leak into neutron error logs.

Proposed patch:
See attached patches. Unless a flaw is discovered in them, these
patches will be merged to their corresponding branches on the public
disclosure date.

CVE: CVE-2017-2592

Proposed public disclosure date/time:
Thursday, January 26, 2017, 1500UTC
Please do not make the issue public (or release public patches)
before this coordinated embargo date.

Original private report:
https://launchpad.net/bugs/1628031
For access to read and comment on this report, please reply to me
with your Launchpad username and I will subscribe you.
Comment 1 Thomas Deutschmann (RETIRED) gentoo-dev 2017-01-26 21:27:48 UTC
Now public.

@ Maintainer(s): Please proceed and push the updated package to the repository!
Comment 2 Matthew Thode ( prometheanfire ) archtester Gentoo Infrastructure gentoo-dev Security 2017-01-26 21:43:51 UTC
Would have been nice to be pinged earlier on this, made the same bug almost.  I am part of the security ml for openstack so this shouldn't remain hidden from be before public date.

in anycase, fix pushed and tree cleaned up.

=dev-python/oslo-middleware-3.19.0-r1
=dev-python/oslo-middleware-3.8.0-r2

have the fix, removing self from cc
Comment 3 Thomas Deutschmann (RETIRED) gentoo-dev 2017-01-26 22:41:08 UTC
GLSA Vote: No

Maintainer already stabilized, repository is clean.