Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2019-3830
Vulnerability from cvelistv5
Published
2019-03-26 17:55
Modified
2024-08-04 19:19
Severity ?
EPSS score ?
Summary
A vulnerability was found in ceilometer before version 12.0.0.0rc1. An Information Exposure in ceilometer-agent prints sensitive configuration data to log files without DEBUG logging being activated.
References
▼ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | https://access.redhat.com/errata/RHSA-2019:0919 | Third Party Advisory | |
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3830 | Issue Tracking, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2019:0919 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3830 | Issue Tracking, Patch, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | [UNKNOWN] | openstack-ceilometer |
Version: fixed in 12.0.0.0rc1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T19:19:18.667Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3830" }, { "name": "RHSA-2019:0919", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:0919" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "openstack-ceilometer", "vendor": "[UNKNOWN]", "versions": [ { "status": "affected", "version": "fixed in 12.0.0.0rc1" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in ceilometer before version 12.0.0.0rc1. An Information Exposure in ceilometer-agent prints sensitive configuration data to log files without DEBUG logging being activated." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-532", "description": "CWE-532", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-04-30T19:06:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3830" }, { "name": "RHSA-2019:0919", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:0919" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2019-3830", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "openstack-ceilometer", "version": { "version_data": [ { "version_value": "fixed in 12.0.0.0rc1" } ] } } ] }, "vendor_name": "[UNKNOWN]" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability was found in ceilometer before version 12.0.0.0rc1. An Information Exposure in ceilometer-agent prints sensitive configuration data to log files without DEBUG logging being activated." } ] }, "impact": { "cvss": [ [ { "vectorString": "4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } ] ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-532" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3830", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3830" }, { "name": "RHSA-2019:0919", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:0919" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2019-3830", "datePublished": "2019-03-26T17:55:47", "dateReserved": "2019-01-03T00:00:00", "dateUpdated": "2024-08-04T19:19:18.667Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:openstack:ceilometer:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"11.01\", \"matchCriteriaId\": \"8991F919-7FD7-4BD0-A576-9A7CBB3B2841\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:openstack:ceilometer:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"2013.1\", \"versionEndIncluding\": \"2015.1.4\", \"matchCriteriaId\": \"6FBA7AED-4378-4E2B-9EB4-E3746EA00949\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E722FEF7-58A6-47AD-B1D0-DB0B71B0C7AA\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"A vulnerability was found in ceilometer before version 12.0.0.0rc1. An Information Exposure in ceilometer-agent prints sensitive configuration data to log files without DEBUG logging being activated.\"}, {\"lang\": \"es\", \"value\": \"Se ha detectado una vulnerabilidad en ceilometer, en versiones anteriores a la 12.0.0.0rc1. Una exposici\\u00f3n de informaci\\u00f3n en ceilometer-agent imprime los datos sensibles de configuraci\\u00f3n en archivos de registro sin que est\\u00e9 activado el registro de DEBUG.\"}]", "id": "CVE-2019-3830", "lastModified": "2024-11-21T04:42:38.093", "metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 7.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 5.9}], \"cvssMetricV30\": [{\"source\": \"secalert@redhat.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\", \"baseScore\": 4.0, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.5, \"impactScore\": 1.4}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:L/Au:N/C:P/I:N/A:N\", \"baseScore\": 2.1, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"LOW\", \"exploitabilityScore\": 3.9, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", "published": "2019-03-26T18:29:00.700", "references": "[{\"url\": \"https://access.redhat.com/errata/RHSA-2019:0919\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3830\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Issue Tracking\", \"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2019:0919\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3830\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Patch\", \"Third Party Advisory\"]}]", "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"secalert@redhat.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-532\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-532\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2019-3830\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2019-03-26T18:29:00.700\",\"lastModified\":\"2024-11-21T04:42:38.093\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability was found in ceilometer before version 12.0.0.0rc1. An Information Exposure in ceilometer-agent prints sensitive configuration data to log files without DEBUG logging being activated.\"},{\"lang\":\"es\",\"value\":\"Se ha detectado una vulnerabilidad en ceilometer, en versiones anteriores a la 12.0.0.0rc1. Una exposici\u00f3n de informaci\u00f3n en ceilometer-agent imprime los datos sensibles de configuraci\u00f3n en archivos de registro sin que est\u00e9 activado el registro de DEBUG.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV30\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\",\"baseScore\":4.0,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.5,\"impactScore\":1.4}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:N/A:N\",\"baseScore\":2.1,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":3.9,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-532\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-532\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openstack:ceilometer:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"11.01\",\"matchCriteriaId\":\"8991F919-7FD7-4BD0-A576-9A7CBB3B2841\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openstack:ceilometer:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2013.1\",\"versionEndIncluding\":\"2015.1.4\",\"matchCriteriaId\":\"6FBA7AED-4378-4E2B-9EB4-E3746EA00949\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E722FEF7-58A6-47AD-B1D0-DB0B71B0C7AA\"}]}]}],\"references\":[{\"url\":\"https://access.redhat.com/errata/RHSA-2019:0919\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3830\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:0919\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3830\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]}]}}" } }
ghsa-2cvf-r9jm-4qm9
Vulnerability from github
Published
2022-05-13 01:14
Modified
2024-09-13 15:15
Severity ?
4.0 (Medium) - CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
6.9 (Medium) - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
6.9 (Medium) - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
Summary
Ceilometer Prints Sensitive Configuration Data to Log
Details
A vulnerability was found in ceilometer before version 12.0.0.0rc1. An Information Exposure in ceilometer-agent prints sensitive configuration data to log files without DEBUG logging being activated.
{ "affected": [ { "package": { "ecosystem": "PyPI", "name": "ceilometer" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "12.0.0.0rc1" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2019-3830" ], "database_specific": { "cwe_ids": [ "CWE-532" ], "github_reviewed": true, "github_reviewed_at": "2023-07-19T20:01:06Z", "nvd_published_at": "2019-03-26T18:29:00Z", "severity": "MODERATE" }, "details": "A vulnerability was found in ceilometer before version 12.0.0.0rc1. An Information Exposure in ceilometer-agent prints sensitive configuration data to log files without DEBUG logging being activated.", "id": "GHSA-2cvf-r9jm-4qm9", "modified": "2024-09-13T15:15:21Z", "published": "2022-05-13T01:14:22Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3830" }, { "type": "WEB", "url": "https://github.com/openstack/ceilometer/commit/8881a42af169a2d7c912b1434911f978883c83f3" }, { "type": "WEB", "url": "https://github.com/openstack/ceilometer/commit/8881a42af169a2d7c912b1434911f978883c83f3#diff-f2d2273521cce7e69f7032c6185936736a5acc70b2b2f90d956b9a7998b087cd" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:0919" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3830" }, { "type": "PACKAGE", "url": "https://github.com/openstack/ceilometer" }, { "type": "WEB", "url": "https://github.com/pypa/advisory-database/tree/main/vulns/ceilometer/PYSEC-2019-78.yaml" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "type": "CVSS_V3" }, { "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N", "type": "CVSS_V4" } ], "summary": "Ceilometer Prints Sensitive Configuration Data to Log" }
RHSA-2019:0580
Vulnerability from csaf_redhat
Published
2019-03-18 12:45
Modified
2024-11-15 05:12
Summary
Red Hat Security Advisory: openstack-ceilometer security and bug fix update
Notes
Topic
An update for openstack-ceilometer is now available for Red Hat OpenStack Platform 14.0 (Rocky).
Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
OpenStack Telemetry (ceilometer) collects customer usage data for metering purposes. Telemetry implements bus listener, push, and polling agents for data collection. This data is stored in a database and presented via the REST API. In addition, Telemetry's extensible design means it can be optionally extended to gather customized data sets.
The following packages have been upgraded to a later upstream version: openstack-ceilometer (11.0.2). (BZ#1677462)
Security Fix(es):
* openstack-ceilometer: ceilometer-agent prints sensitive data from config files through log files (CVE-2019-3830)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for openstack-ceilometer is now available for Red Hat OpenStack Platform 14.0 (Rocky).\n\nRed Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenStack Telemetry (ceilometer) collects customer usage data for metering purposes. Telemetry implements bus listener, push, and polling agents for data collection. This data is stored in a database and presented via the REST API. In addition, Telemetry\u0027s extensible design means it can be optionally extended to gather customized data sets.\n\nThe following packages have been upgraded to a later upstream version: openstack-ceilometer (11.0.2). (BZ#1677462)\n\nSecurity Fix(es):\n\n* openstack-ceilometer: ceilometer-agent prints sensitive data from config files through log files (CVE-2019-3830)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:0580", "url": "https://access.redhat.com/errata/RHSA-2019:0580" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "1671261", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1671261" }, { "category": "external", "summary": "1677389", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1677389" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_0580.json" } ], "title": "Red Hat Security Advisory: openstack-ceilometer security and bug fix update", "tracking": { "current_release_date": "2024-11-15T05:12:54+00:00", "generator": { "date": "2024-11-15T05:12:54+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2019:0580", "initial_release_date": "2019-03-18T12:45:03+00:00", "revision_history": [ { "date": "2019-03-18T12:45:03+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-03-18T12:45:03+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T05:12:54+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenStack Platform 14.0", "product": { "name": "Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:14::el7" } } } ], "category": "product_family", "name": "Red Hat OpenStack Platform" }, { "branches": [ { "category": "product_version", "name": "openstack-ceilometer-1:11.0.2-0.20190117115822.50f268f.el7ost.src", "product": { "name": "openstack-ceilometer-1:11.0.2-0.20190117115822.50f268f.el7ost.src", "product_id": "openstack-ceilometer-1:11.0.2-0.20190117115822.50f268f.el7ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ceilometer@11.0.2-0.20190117115822.50f268f.el7ost?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openstack-ceilometer-central-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "product": { "name": "openstack-ceilometer-central-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "product_id": "openstack-ceilometer-central-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ceilometer-central@11.0.2-0.20190117115822.50f268f.el7ost?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "openstack-ceilometer-compute-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "product": { "name": "openstack-ceilometer-compute-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "product_id": "openstack-ceilometer-compute-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ceilometer-compute@11.0.2-0.20190117115822.50f268f.el7ost?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "openstack-ceilometer-polling-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "product": { "name": "openstack-ceilometer-polling-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "product_id": "openstack-ceilometer-polling-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ceilometer-polling@11.0.2-0.20190117115822.50f268f.el7ost?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "openstack-ceilometer-ipmi-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "product": { "name": "openstack-ceilometer-ipmi-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "product_id": "openstack-ceilometer-ipmi-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ceilometer-ipmi@11.0.2-0.20190117115822.50f268f.el7ost?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "openstack-ceilometer-common-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "product": { "name": "openstack-ceilometer-common-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "product_id": "openstack-ceilometer-common-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ceilometer-common@11.0.2-0.20190117115822.50f268f.el7ost?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "python-ceilometer-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "product": { "name": "python-ceilometer-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "product_id": "python-ceilometer-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-ceilometer@11.0.2-0.20190117115822.50f268f.el7ost?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "openstack-ceilometer-notification-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "product": { "name": "openstack-ceilometer-notification-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "product_id": "openstack-ceilometer-notification-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ceilometer-notification@11.0.2-0.20190117115822.50f268f.el7ost?arch=noarch\u0026epoch=1" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openstack-ceilometer-1:11.0.2-0.20190117115822.50f268f.el7ost.src as a component of Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0:openstack-ceilometer-1:11.0.2-0.20190117115822.50f268f.el7ost.src" }, "product_reference": "openstack-ceilometer-1:11.0.2-0.20190117115822.50f268f.el7ost.src", "relates_to_product_reference": "7Server-RH7-RHOS-14.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ceilometer-central-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch as a component of Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0:openstack-ceilometer-central-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch" }, "product_reference": "openstack-ceilometer-central-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-14.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ceilometer-common-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch as a component of Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0:openstack-ceilometer-common-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch" }, "product_reference": "openstack-ceilometer-common-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-14.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ceilometer-compute-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch as a component of Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0:openstack-ceilometer-compute-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch" }, "product_reference": "openstack-ceilometer-compute-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-14.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ceilometer-ipmi-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch as a component of Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0:openstack-ceilometer-ipmi-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch" }, "product_reference": "openstack-ceilometer-ipmi-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-14.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ceilometer-notification-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch as a component of Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0:openstack-ceilometer-notification-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch" }, "product_reference": "openstack-ceilometer-notification-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-14.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ceilometer-polling-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch as a component of Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0:openstack-ceilometer-polling-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch" }, "product_reference": "openstack-ceilometer-polling-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-14.0" }, { "category": "default_component_of", "full_product_name": { "name": "python-ceilometer-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch as a component of Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0:python-ceilometer-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch" }, "product_reference": "python-ceilometer-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-14.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-3830", "cwe": { "id": "CWE-532", "name": "Insertion of Sensitive Information into Log File" }, "discovery_date": "2019-02-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1677389" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in ceilometer where administrative credentials were permanently stored in the log. A user with access to the logs could obtain these credentials and escalate their privileges.", "title": "Vulnerability description" }, { "category": "summary", "text": "openstack-ceilometer: ceilometer-agent prints sensitive data from config files through log files", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOS-14.0:openstack-ceilometer-1:11.0.2-0.20190117115822.50f268f.el7ost.src", "7Server-RH7-RHOS-14.0:openstack-ceilometer-central-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "7Server-RH7-RHOS-14.0:openstack-ceilometer-common-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "7Server-RH7-RHOS-14.0:openstack-ceilometer-compute-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "7Server-RH7-RHOS-14.0:openstack-ceilometer-ipmi-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "7Server-RH7-RHOS-14.0:openstack-ceilometer-notification-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "7Server-RH7-RHOS-14.0:openstack-ceilometer-polling-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "7Server-RH7-RHOS-14.0:python-ceilometer-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-3830" }, { "category": "external", "summary": "RHBZ#1677389", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1677389" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-3830", "url": "https://www.cve.org/CVERecord?id=CVE-2019-3830" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3830", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3830" } ], "release_date": "2019-01-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-03-18T12:45:03+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOS-14.0:openstack-ceilometer-1:11.0.2-0.20190117115822.50f268f.el7ost.src", "7Server-RH7-RHOS-14.0:openstack-ceilometer-central-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "7Server-RH7-RHOS-14.0:openstack-ceilometer-common-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "7Server-RH7-RHOS-14.0:openstack-ceilometer-compute-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "7Server-RH7-RHOS-14.0:openstack-ceilometer-ipmi-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "7Server-RH7-RHOS-14.0:openstack-ceilometer-notification-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "7Server-RH7-RHOS-14.0:openstack-ceilometer-polling-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "7Server-RH7-RHOS-14.0:python-ceilometer-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:0580" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "7Server-RH7-RHOS-14.0:openstack-ceilometer-1:11.0.2-0.20190117115822.50f268f.el7ost.src", "7Server-RH7-RHOS-14.0:openstack-ceilometer-central-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "7Server-RH7-RHOS-14.0:openstack-ceilometer-common-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "7Server-RH7-RHOS-14.0:openstack-ceilometer-compute-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "7Server-RH7-RHOS-14.0:openstack-ceilometer-ipmi-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "7Server-RH7-RHOS-14.0:openstack-ceilometer-notification-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "7Server-RH7-RHOS-14.0:openstack-ceilometer-polling-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "7Server-RH7-RHOS-14.0:python-ceilometer-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openstack-ceilometer: ceilometer-agent prints sensitive data from config files through log files" } ] }
rhsa-2019:0919
Vulnerability from csaf_redhat
Published
2019-04-30 17:03
Modified
2024-11-15 05:13
Summary
Red Hat Security Advisory: openstack-ceilometer security update
Notes
Topic
An update for openstack-ceilometer is now available for Red Hat OpenStack Platform 10.0 (Newton).
Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
OpenStack Telemetry (ceilometer) collects customer usage data for metering purposes. Telemetry implements bus listener, push, and polling agents for data collection. This data is stored in a database and presented via the REST API. In addition, Telemetry's extensible design means it can be optionally extended to gather customized data sets.
Security Fix(es):
* openstack-ceilometer: ceilometer-agent prints sensitive data from config files through log files (CVE-2019-3830)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for openstack-ceilometer is now available for Red Hat OpenStack Platform 10.0 (Newton).\n\nRed Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenStack Telemetry (ceilometer) collects customer usage data for metering purposes. Telemetry implements bus listener, push, and polling agents for data collection. This data is stored in a database and presented via the REST API. In addition, Telemetry\u0027s extensible design means it can be optionally extended to gather customized data sets.\n\nSecurity Fix(es):\n\n* openstack-ceilometer: ceilometer-agent prints sensitive data from config files through log files (CVE-2019-3830)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:0919", "url": "https://access.redhat.com/errata/RHSA-2019:0919" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "1677389", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1677389" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_0919.json" } ], "title": "Red Hat Security Advisory: openstack-ceilometer security update", "tracking": { "current_release_date": "2024-11-15T05:13:49+00:00", "generator": { "date": "2024-11-15T05:13:49+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2019:0919", "initial_release_date": "2019-04-30T17:03:12+00:00", "revision_history": [ { "date": "2019-04-30T17:03:12+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-04-30T17:03:12+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T05:13:49+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenStack Platform 10.0", "product": { "name": "Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:10::el7" } } } ], "category": "product_family", "name": "Red Hat OpenStack Platform" }, { "branches": [ { "category": "product_version", "name": "openstack-ceilometer-api-1:7.1.1-9.el7ost.noarch", "product": { "name": "openstack-ceilometer-api-1:7.1.1-9.el7ost.noarch", "product_id": "openstack-ceilometer-api-1:7.1.1-9.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ceilometer-api@7.1.1-9.el7ost?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "python-ceilometer-tests-1:7.1.1-9.el7ost.noarch", "product": { "name": "python-ceilometer-tests-1:7.1.1-9.el7ost.noarch", "product_id": "python-ceilometer-tests-1:7.1.1-9.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-ceilometer-tests@7.1.1-9.el7ost?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "openstack-ceilometer-common-1:7.1.1-9.el7ost.noarch", "product": { "name": "openstack-ceilometer-common-1:7.1.1-9.el7ost.noarch", "product_id": "openstack-ceilometer-common-1:7.1.1-9.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ceilometer-common@7.1.1-9.el7ost?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "openstack-ceilometer-notification-1:7.1.1-9.el7ost.noarch", "product": { "name": "openstack-ceilometer-notification-1:7.1.1-9.el7ost.noarch", "product_id": "openstack-ceilometer-notification-1:7.1.1-9.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ceilometer-notification@7.1.1-9.el7ost?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "openstack-ceilometer-collector-1:7.1.1-9.el7ost.noarch", "product": { "name": "openstack-ceilometer-collector-1:7.1.1-9.el7ost.noarch", "product_id": "openstack-ceilometer-collector-1:7.1.1-9.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ceilometer-collector@7.1.1-9.el7ost?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "openstack-ceilometer-polling-1:7.1.1-9.el7ost.noarch", "product": { "name": "openstack-ceilometer-polling-1:7.1.1-9.el7ost.noarch", "product_id": "openstack-ceilometer-polling-1:7.1.1-9.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ceilometer-polling@7.1.1-9.el7ost?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "python-ceilometer-1:7.1.1-9.el7ost.noarch", "product": { "name": "python-ceilometer-1:7.1.1-9.el7ost.noarch", "product_id": "python-ceilometer-1:7.1.1-9.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-ceilometer@7.1.1-9.el7ost?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "openstack-ceilometer-ipmi-1:7.1.1-9.el7ost.noarch", "product": { "name": "openstack-ceilometer-ipmi-1:7.1.1-9.el7ost.noarch", "product_id": "openstack-ceilometer-ipmi-1:7.1.1-9.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ceilometer-ipmi@7.1.1-9.el7ost?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "openstack-ceilometer-compute-1:7.1.1-9.el7ost.noarch", "product": { "name": "openstack-ceilometer-compute-1:7.1.1-9.el7ost.noarch", "product_id": "openstack-ceilometer-compute-1:7.1.1-9.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ceilometer-compute@7.1.1-9.el7ost?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "openstack-ceilometer-central-1:7.1.1-9.el7ost.noarch", "product": { "name": "openstack-ceilometer-central-1:7.1.1-9.el7ost.noarch", "product_id": "openstack-ceilometer-central-1:7.1.1-9.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ceilometer-central@7.1.1-9.el7ost?arch=noarch\u0026epoch=1" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "openstack-ceilometer-1:7.1.1-9.el7ost.src", "product": { "name": "openstack-ceilometer-1:7.1.1-9.el7ost.src", "product_id": "openstack-ceilometer-1:7.1.1-9.el7ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ceilometer@7.1.1-9.el7ost?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openstack-ceilometer-1:7.1.1-9.el7ost.src as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:openstack-ceilometer-1:7.1.1-9.el7ost.src" }, "product_reference": "openstack-ceilometer-1:7.1.1-9.el7ost.src", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ceilometer-api-1:7.1.1-9.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:openstack-ceilometer-api-1:7.1.1-9.el7ost.noarch" }, "product_reference": "openstack-ceilometer-api-1:7.1.1-9.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ceilometer-central-1:7.1.1-9.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:openstack-ceilometer-central-1:7.1.1-9.el7ost.noarch" }, "product_reference": "openstack-ceilometer-central-1:7.1.1-9.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ceilometer-collector-1:7.1.1-9.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:openstack-ceilometer-collector-1:7.1.1-9.el7ost.noarch" }, "product_reference": "openstack-ceilometer-collector-1:7.1.1-9.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ceilometer-common-1:7.1.1-9.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:openstack-ceilometer-common-1:7.1.1-9.el7ost.noarch" }, "product_reference": "openstack-ceilometer-common-1:7.1.1-9.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ceilometer-compute-1:7.1.1-9.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:openstack-ceilometer-compute-1:7.1.1-9.el7ost.noarch" }, "product_reference": "openstack-ceilometer-compute-1:7.1.1-9.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ceilometer-ipmi-1:7.1.1-9.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:openstack-ceilometer-ipmi-1:7.1.1-9.el7ost.noarch" }, "product_reference": "openstack-ceilometer-ipmi-1:7.1.1-9.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ceilometer-notification-1:7.1.1-9.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:openstack-ceilometer-notification-1:7.1.1-9.el7ost.noarch" }, "product_reference": "openstack-ceilometer-notification-1:7.1.1-9.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ceilometer-polling-1:7.1.1-9.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:openstack-ceilometer-polling-1:7.1.1-9.el7ost.noarch" }, "product_reference": "openstack-ceilometer-polling-1:7.1.1-9.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "python-ceilometer-1:7.1.1-9.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:python-ceilometer-1:7.1.1-9.el7ost.noarch" }, "product_reference": "python-ceilometer-1:7.1.1-9.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "python-ceilometer-tests-1:7.1.1-9.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:python-ceilometer-tests-1:7.1.1-9.el7ost.noarch" }, "product_reference": "python-ceilometer-tests-1:7.1.1-9.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-3830", "cwe": { "id": "CWE-532", "name": "Insertion of Sensitive Information into Log File" }, "discovery_date": "2019-02-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1677389" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in ceilometer where administrative credentials were permanently stored in the log. A user with access to the logs could obtain these credentials and escalate their privileges.", "title": "Vulnerability description" }, { "category": "summary", "text": "openstack-ceilometer: ceilometer-agent prints sensitive data from config files through log files", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOS-10.0:openstack-ceilometer-1:7.1.1-9.el7ost.src", "7Server-RH7-RHOS-10.0:openstack-ceilometer-api-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-ceilometer-central-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-ceilometer-collector-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-ceilometer-common-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-ceilometer-compute-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-ceilometer-ipmi-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-ceilometer-notification-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-ceilometer-polling-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:python-ceilometer-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:python-ceilometer-tests-1:7.1.1-9.el7ost.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-3830" }, { "category": "external", "summary": "RHBZ#1677389", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1677389" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-3830", "url": "https://www.cve.org/CVERecord?id=CVE-2019-3830" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3830", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3830" } ], "release_date": "2019-01-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-04-30T17:03:12+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOS-10.0:openstack-ceilometer-1:7.1.1-9.el7ost.src", "7Server-RH7-RHOS-10.0:openstack-ceilometer-api-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-ceilometer-central-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-ceilometer-collector-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-ceilometer-common-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-ceilometer-compute-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-ceilometer-ipmi-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-ceilometer-notification-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-ceilometer-polling-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:python-ceilometer-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:python-ceilometer-tests-1:7.1.1-9.el7ost.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:0919" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "7Server-RH7-RHOS-10.0:openstack-ceilometer-1:7.1.1-9.el7ost.src", "7Server-RH7-RHOS-10.0:openstack-ceilometer-api-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-ceilometer-central-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-ceilometer-collector-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-ceilometer-common-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-ceilometer-compute-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-ceilometer-ipmi-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-ceilometer-notification-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-ceilometer-polling-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:python-ceilometer-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:python-ceilometer-tests-1:7.1.1-9.el7ost.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openstack-ceilometer: ceilometer-agent prints sensitive data from config files through log files" } ] }
rhsa-2019:0566
Vulnerability from csaf_redhat
Published
2019-03-14 13:31
Modified
2024-11-15 05:12
Summary
Red Hat Security Advisory: openstack-ceilometer security and bug fix update
Notes
Topic
An update for openstack-ceilometer is now available for Red Hat OpenStack Platform 13.0 (Queens).
Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
OpenStack Telemetry (ceilometer) collects customer usage data for metering purposes. Telemetry implements bus listener, push, and polling agents for data collection. This data is stored in a database and presented via the REST API. In addition, Telemetry's extensible design means it can be optionally extended to gather customized data sets.
Security Fix(es):
* openstack-ceilometer: ceilometer-agent prints sensitive data from config files through log files (CVE-2019-3830)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for openstack-ceilometer is now available for Red Hat OpenStack Platform 13.0 (Queens).\n\nRed Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenStack Telemetry (ceilometer) collects customer usage data for metering purposes. Telemetry implements bus listener, push, and polling agents for data collection. This data is stored in a database and presented via the REST API. In addition, Telemetry\u0027s extensible design means it can be optionally extended to gather customized data sets.\n\nSecurity Fix(es):\n\n* openstack-ceilometer: ceilometer-agent prints sensitive data from config files through log files (CVE-2019-3830)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:0566", "url": "https://access.redhat.com/errata/RHSA-2019:0566" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "1659044", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1659044" }, { "category": "external", "summary": "1669296", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1669296" }, { "category": "external", "summary": "1671037", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1671037" }, { "category": "external", "summary": "1677389", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1677389" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_0566.json" } ], "title": "Red Hat Security Advisory: openstack-ceilometer security and bug fix update", "tracking": { "current_release_date": "2024-11-15T05:12:42+00:00", "generator": { "date": "2024-11-15T05:12:42+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2019:0566", "initial_release_date": "2019-03-14T13:31:51+00:00", "revision_history": [ { "date": "2019-03-14T13:31:51+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-03-14T13:31:51+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T05:12:42+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenStack Platform 13.0", "product": { "name": "Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-13.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:13::el7" } } } ], "category": "product_family", "name": "Red Hat OpenStack Platform" }, { "branches": [ { "category": "product_version", "name": "openstack-ceilometer-common-1:10.0.1-6.el7ost.noarch", "product": { "name": "openstack-ceilometer-common-1:10.0.1-6.el7ost.noarch", "product_id": "openstack-ceilometer-common-1:10.0.1-6.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ceilometer-common@10.0.1-6.el7ost?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "openstack-ceilometer-ipmi-1:10.0.1-6.el7ost.noarch", "product": { "name": "openstack-ceilometer-ipmi-1:10.0.1-6.el7ost.noarch", "product_id": "openstack-ceilometer-ipmi-1:10.0.1-6.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ceilometer-ipmi@10.0.1-6.el7ost?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "openstack-ceilometer-central-1:10.0.1-6.el7ost.noarch", "product": { "name": "openstack-ceilometer-central-1:10.0.1-6.el7ost.noarch", "product_id": "openstack-ceilometer-central-1:10.0.1-6.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ceilometer-central@10.0.1-6.el7ost?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "openstack-ceilometer-polling-1:10.0.1-6.el7ost.noarch", "product": { "name": "openstack-ceilometer-polling-1:10.0.1-6.el7ost.noarch", "product_id": "openstack-ceilometer-polling-1:10.0.1-6.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ceilometer-polling@10.0.1-6.el7ost?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "openstack-ceilometer-notification-1:10.0.1-6.el7ost.noarch", "product": { "name": "openstack-ceilometer-notification-1:10.0.1-6.el7ost.noarch", "product_id": "openstack-ceilometer-notification-1:10.0.1-6.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ceilometer-notification@10.0.1-6.el7ost?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "openstack-ceilometer-compute-1:10.0.1-6.el7ost.noarch", "product": { "name": "openstack-ceilometer-compute-1:10.0.1-6.el7ost.noarch", "product_id": "openstack-ceilometer-compute-1:10.0.1-6.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ceilometer-compute@10.0.1-6.el7ost?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "python-ceilometer-1:10.0.1-6.el7ost.noarch", "product": { "name": "python-ceilometer-1:10.0.1-6.el7ost.noarch", "product_id": "python-ceilometer-1:10.0.1-6.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-ceilometer@10.0.1-6.el7ost?arch=noarch\u0026epoch=1" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "openstack-ceilometer-1:10.0.1-6.el7ost.src", "product": { "name": "openstack-ceilometer-1:10.0.1-6.el7ost.src", "product_id": "openstack-ceilometer-1:10.0.1-6.el7ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ceilometer@10.0.1-6.el7ost?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openstack-ceilometer-1:10.0.1-6.el7ost.src as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-13.0:openstack-ceilometer-1:10.0.1-6.el7ost.src" }, "product_reference": "openstack-ceilometer-1:10.0.1-6.el7ost.src", "relates_to_product_reference": "7Server-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ceilometer-central-1:10.0.1-6.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-13.0:openstack-ceilometer-central-1:10.0.1-6.el7ost.noarch" }, "product_reference": "openstack-ceilometer-central-1:10.0.1-6.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ceilometer-common-1:10.0.1-6.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-13.0:openstack-ceilometer-common-1:10.0.1-6.el7ost.noarch" }, "product_reference": "openstack-ceilometer-common-1:10.0.1-6.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ceilometer-compute-1:10.0.1-6.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-13.0:openstack-ceilometer-compute-1:10.0.1-6.el7ost.noarch" }, "product_reference": "openstack-ceilometer-compute-1:10.0.1-6.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ceilometer-ipmi-1:10.0.1-6.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-13.0:openstack-ceilometer-ipmi-1:10.0.1-6.el7ost.noarch" }, "product_reference": "openstack-ceilometer-ipmi-1:10.0.1-6.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ceilometer-notification-1:10.0.1-6.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-13.0:openstack-ceilometer-notification-1:10.0.1-6.el7ost.noarch" }, "product_reference": "openstack-ceilometer-notification-1:10.0.1-6.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ceilometer-polling-1:10.0.1-6.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-13.0:openstack-ceilometer-polling-1:10.0.1-6.el7ost.noarch" }, "product_reference": "openstack-ceilometer-polling-1:10.0.1-6.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "python-ceilometer-1:10.0.1-6.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-13.0:python-ceilometer-1:10.0.1-6.el7ost.noarch" }, "product_reference": "python-ceilometer-1:10.0.1-6.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-13.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-3830", "cwe": { "id": "CWE-532", "name": "Insertion of Sensitive Information into Log File" }, "discovery_date": "2019-02-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1677389" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in ceilometer where administrative credentials were permanently stored in the log. A user with access to the logs could obtain these credentials and escalate their privileges.", "title": "Vulnerability description" }, { "category": "summary", "text": "openstack-ceilometer: ceilometer-agent prints sensitive data from config files through log files", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOS-13.0:openstack-ceilometer-1:10.0.1-6.el7ost.src", "7Server-RH7-RHOS-13.0:openstack-ceilometer-central-1:10.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0:openstack-ceilometer-common-1:10.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0:openstack-ceilometer-compute-1:10.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0:openstack-ceilometer-ipmi-1:10.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0:openstack-ceilometer-notification-1:10.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0:openstack-ceilometer-polling-1:10.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0:python-ceilometer-1:10.0.1-6.el7ost.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-3830" }, { "category": "external", "summary": "RHBZ#1677389", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1677389" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-3830", "url": "https://www.cve.org/CVERecord?id=CVE-2019-3830" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3830", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3830" } ], "release_date": "2019-01-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-03-14T13:31:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOS-13.0:openstack-ceilometer-1:10.0.1-6.el7ost.src", "7Server-RH7-RHOS-13.0:openstack-ceilometer-central-1:10.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0:openstack-ceilometer-common-1:10.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0:openstack-ceilometer-compute-1:10.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0:openstack-ceilometer-ipmi-1:10.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0:openstack-ceilometer-notification-1:10.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0:openstack-ceilometer-polling-1:10.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0:python-ceilometer-1:10.0.1-6.el7ost.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:0566" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "7Server-RH7-RHOS-13.0:openstack-ceilometer-1:10.0.1-6.el7ost.src", "7Server-RH7-RHOS-13.0:openstack-ceilometer-central-1:10.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0:openstack-ceilometer-common-1:10.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0:openstack-ceilometer-compute-1:10.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0:openstack-ceilometer-ipmi-1:10.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0:openstack-ceilometer-notification-1:10.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0:openstack-ceilometer-polling-1:10.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0:python-ceilometer-1:10.0.1-6.el7ost.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openstack-ceilometer: ceilometer-agent prints sensitive data from config files through log files" } ] }
RHSA-2019:0919
Vulnerability from csaf_redhat
Published
2019-04-30 17:03
Modified
2024-11-15 05:13
Summary
Red Hat Security Advisory: openstack-ceilometer security update
Notes
Topic
An update for openstack-ceilometer is now available for Red Hat OpenStack Platform 10.0 (Newton).
Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
OpenStack Telemetry (ceilometer) collects customer usage data for metering purposes. Telemetry implements bus listener, push, and polling agents for data collection. This data is stored in a database and presented via the REST API. In addition, Telemetry's extensible design means it can be optionally extended to gather customized data sets.
Security Fix(es):
* openstack-ceilometer: ceilometer-agent prints sensitive data from config files through log files (CVE-2019-3830)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for openstack-ceilometer is now available for Red Hat OpenStack Platform 10.0 (Newton).\n\nRed Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenStack Telemetry (ceilometer) collects customer usage data for metering purposes. Telemetry implements bus listener, push, and polling agents for data collection. This data is stored in a database and presented via the REST API. In addition, Telemetry\u0027s extensible design means it can be optionally extended to gather customized data sets.\n\nSecurity Fix(es):\n\n* openstack-ceilometer: ceilometer-agent prints sensitive data from config files through log files (CVE-2019-3830)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:0919", "url": "https://access.redhat.com/errata/RHSA-2019:0919" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "1677389", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1677389" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_0919.json" } ], "title": "Red Hat Security Advisory: openstack-ceilometer security update", "tracking": { "current_release_date": "2024-11-15T05:13:49+00:00", "generator": { "date": "2024-11-15T05:13:49+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2019:0919", "initial_release_date": "2019-04-30T17:03:12+00:00", "revision_history": [ { "date": "2019-04-30T17:03:12+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-04-30T17:03:12+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T05:13:49+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenStack Platform 10.0", "product": { "name": "Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:10::el7" } } } ], "category": "product_family", "name": "Red Hat OpenStack Platform" }, { "branches": [ { "category": "product_version", "name": "openstack-ceilometer-api-1:7.1.1-9.el7ost.noarch", "product": { "name": "openstack-ceilometer-api-1:7.1.1-9.el7ost.noarch", "product_id": "openstack-ceilometer-api-1:7.1.1-9.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ceilometer-api@7.1.1-9.el7ost?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "python-ceilometer-tests-1:7.1.1-9.el7ost.noarch", "product": { "name": "python-ceilometer-tests-1:7.1.1-9.el7ost.noarch", "product_id": "python-ceilometer-tests-1:7.1.1-9.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-ceilometer-tests@7.1.1-9.el7ost?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "openstack-ceilometer-common-1:7.1.1-9.el7ost.noarch", "product": { "name": "openstack-ceilometer-common-1:7.1.1-9.el7ost.noarch", "product_id": "openstack-ceilometer-common-1:7.1.1-9.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ceilometer-common@7.1.1-9.el7ost?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "openstack-ceilometer-notification-1:7.1.1-9.el7ost.noarch", "product": { "name": "openstack-ceilometer-notification-1:7.1.1-9.el7ost.noarch", "product_id": "openstack-ceilometer-notification-1:7.1.1-9.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ceilometer-notification@7.1.1-9.el7ost?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "openstack-ceilometer-collector-1:7.1.1-9.el7ost.noarch", "product": { "name": "openstack-ceilometer-collector-1:7.1.1-9.el7ost.noarch", "product_id": "openstack-ceilometer-collector-1:7.1.1-9.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ceilometer-collector@7.1.1-9.el7ost?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "openstack-ceilometer-polling-1:7.1.1-9.el7ost.noarch", "product": { "name": "openstack-ceilometer-polling-1:7.1.1-9.el7ost.noarch", "product_id": "openstack-ceilometer-polling-1:7.1.1-9.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ceilometer-polling@7.1.1-9.el7ost?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "python-ceilometer-1:7.1.1-9.el7ost.noarch", "product": { "name": "python-ceilometer-1:7.1.1-9.el7ost.noarch", "product_id": "python-ceilometer-1:7.1.1-9.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-ceilometer@7.1.1-9.el7ost?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "openstack-ceilometer-ipmi-1:7.1.1-9.el7ost.noarch", "product": { "name": "openstack-ceilometer-ipmi-1:7.1.1-9.el7ost.noarch", "product_id": "openstack-ceilometer-ipmi-1:7.1.1-9.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ceilometer-ipmi@7.1.1-9.el7ost?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "openstack-ceilometer-compute-1:7.1.1-9.el7ost.noarch", "product": { "name": "openstack-ceilometer-compute-1:7.1.1-9.el7ost.noarch", "product_id": "openstack-ceilometer-compute-1:7.1.1-9.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ceilometer-compute@7.1.1-9.el7ost?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "openstack-ceilometer-central-1:7.1.1-9.el7ost.noarch", "product": { "name": "openstack-ceilometer-central-1:7.1.1-9.el7ost.noarch", "product_id": "openstack-ceilometer-central-1:7.1.1-9.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ceilometer-central@7.1.1-9.el7ost?arch=noarch\u0026epoch=1" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "openstack-ceilometer-1:7.1.1-9.el7ost.src", "product": { "name": "openstack-ceilometer-1:7.1.1-9.el7ost.src", "product_id": "openstack-ceilometer-1:7.1.1-9.el7ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ceilometer@7.1.1-9.el7ost?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openstack-ceilometer-1:7.1.1-9.el7ost.src as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:openstack-ceilometer-1:7.1.1-9.el7ost.src" }, "product_reference": "openstack-ceilometer-1:7.1.1-9.el7ost.src", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ceilometer-api-1:7.1.1-9.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:openstack-ceilometer-api-1:7.1.1-9.el7ost.noarch" }, "product_reference": "openstack-ceilometer-api-1:7.1.1-9.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ceilometer-central-1:7.1.1-9.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:openstack-ceilometer-central-1:7.1.1-9.el7ost.noarch" }, "product_reference": "openstack-ceilometer-central-1:7.1.1-9.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ceilometer-collector-1:7.1.1-9.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:openstack-ceilometer-collector-1:7.1.1-9.el7ost.noarch" }, "product_reference": "openstack-ceilometer-collector-1:7.1.1-9.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ceilometer-common-1:7.1.1-9.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:openstack-ceilometer-common-1:7.1.1-9.el7ost.noarch" }, "product_reference": "openstack-ceilometer-common-1:7.1.1-9.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ceilometer-compute-1:7.1.1-9.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:openstack-ceilometer-compute-1:7.1.1-9.el7ost.noarch" }, "product_reference": "openstack-ceilometer-compute-1:7.1.1-9.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ceilometer-ipmi-1:7.1.1-9.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:openstack-ceilometer-ipmi-1:7.1.1-9.el7ost.noarch" }, "product_reference": "openstack-ceilometer-ipmi-1:7.1.1-9.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ceilometer-notification-1:7.1.1-9.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:openstack-ceilometer-notification-1:7.1.1-9.el7ost.noarch" }, "product_reference": "openstack-ceilometer-notification-1:7.1.1-9.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ceilometer-polling-1:7.1.1-9.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:openstack-ceilometer-polling-1:7.1.1-9.el7ost.noarch" }, "product_reference": "openstack-ceilometer-polling-1:7.1.1-9.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "python-ceilometer-1:7.1.1-9.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:python-ceilometer-1:7.1.1-9.el7ost.noarch" }, "product_reference": "python-ceilometer-1:7.1.1-9.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "python-ceilometer-tests-1:7.1.1-9.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:python-ceilometer-tests-1:7.1.1-9.el7ost.noarch" }, "product_reference": "python-ceilometer-tests-1:7.1.1-9.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-3830", "cwe": { "id": "CWE-532", "name": "Insertion of Sensitive Information into Log File" }, "discovery_date": "2019-02-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1677389" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in ceilometer where administrative credentials were permanently stored in the log. A user with access to the logs could obtain these credentials and escalate their privileges.", "title": "Vulnerability description" }, { "category": "summary", "text": "openstack-ceilometer: ceilometer-agent prints sensitive data from config files through log files", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOS-10.0:openstack-ceilometer-1:7.1.1-9.el7ost.src", "7Server-RH7-RHOS-10.0:openstack-ceilometer-api-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-ceilometer-central-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-ceilometer-collector-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-ceilometer-common-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-ceilometer-compute-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-ceilometer-ipmi-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-ceilometer-notification-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-ceilometer-polling-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:python-ceilometer-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:python-ceilometer-tests-1:7.1.1-9.el7ost.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-3830" }, { "category": "external", "summary": "RHBZ#1677389", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1677389" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-3830", "url": "https://www.cve.org/CVERecord?id=CVE-2019-3830" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3830", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3830" } ], "release_date": "2019-01-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-04-30T17:03:12+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOS-10.0:openstack-ceilometer-1:7.1.1-9.el7ost.src", "7Server-RH7-RHOS-10.0:openstack-ceilometer-api-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-ceilometer-central-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-ceilometer-collector-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-ceilometer-common-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-ceilometer-compute-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-ceilometer-ipmi-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-ceilometer-notification-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-ceilometer-polling-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:python-ceilometer-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:python-ceilometer-tests-1:7.1.1-9.el7ost.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:0919" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "7Server-RH7-RHOS-10.0:openstack-ceilometer-1:7.1.1-9.el7ost.src", "7Server-RH7-RHOS-10.0:openstack-ceilometer-api-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-ceilometer-central-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-ceilometer-collector-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-ceilometer-common-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-ceilometer-compute-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-ceilometer-ipmi-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-ceilometer-notification-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-ceilometer-polling-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:python-ceilometer-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:python-ceilometer-tests-1:7.1.1-9.el7ost.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openstack-ceilometer: ceilometer-agent prints sensitive data from config files through log files" } ] }
rhsa-2019_0566
Vulnerability from csaf_redhat
Published
2019-03-14 13:31
Modified
2024-11-15 05:12
Summary
Red Hat Security Advisory: openstack-ceilometer security and bug fix update
Notes
Topic
An update for openstack-ceilometer is now available for Red Hat OpenStack Platform 13.0 (Queens).
Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
OpenStack Telemetry (ceilometer) collects customer usage data for metering purposes. Telemetry implements bus listener, push, and polling agents for data collection. This data is stored in a database and presented via the REST API. In addition, Telemetry's extensible design means it can be optionally extended to gather customized data sets.
Security Fix(es):
* openstack-ceilometer: ceilometer-agent prints sensitive data from config files through log files (CVE-2019-3830)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for openstack-ceilometer is now available for Red Hat OpenStack Platform 13.0 (Queens).\n\nRed Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenStack Telemetry (ceilometer) collects customer usage data for metering purposes. Telemetry implements bus listener, push, and polling agents for data collection. This data is stored in a database and presented via the REST API. In addition, Telemetry\u0027s extensible design means it can be optionally extended to gather customized data sets.\n\nSecurity Fix(es):\n\n* openstack-ceilometer: ceilometer-agent prints sensitive data from config files through log files (CVE-2019-3830)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:0566", "url": "https://access.redhat.com/errata/RHSA-2019:0566" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "1659044", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1659044" }, { "category": "external", "summary": "1669296", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1669296" }, { "category": "external", "summary": "1671037", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1671037" }, { "category": "external", "summary": "1677389", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1677389" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_0566.json" } ], "title": "Red Hat Security Advisory: openstack-ceilometer security and bug fix update", "tracking": { "current_release_date": "2024-11-15T05:12:42+00:00", "generator": { "date": "2024-11-15T05:12:42+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2019:0566", "initial_release_date": "2019-03-14T13:31:51+00:00", "revision_history": [ { "date": "2019-03-14T13:31:51+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-03-14T13:31:51+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T05:12:42+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenStack Platform 13.0", "product": { "name": "Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-13.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:13::el7" } } } ], "category": "product_family", "name": "Red Hat OpenStack Platform" }, { "branches": [ { "category": "product_version", "name": "openstack-ceilometer-common-1:10.0.1-6.el7ost.noarch", "product": { "name": "openstack-ceilometer-common-1:10.0.1-6.el7ost.noarch", "product_id": "openstack-ceilometer-common-1:10.0.1-6.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ceilometer-common@10.0.1-6.el7ost?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "openstack-ceilometer-ipmi-1:10.0.1-6.el7ost.noarch", "product": { "name": "openstack-ceilometer-ipmi-1:10.0.1-6.el7ost.noarch", "product_id": "openstack-ceilometer-ipmi-1:10.0.1-6.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ceilometer-ipmi@10.0.1-6.el7ost?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "openstack-ceilometer-central-1:10.0.1-6.el7ost.noarch", "product": { "name": "openstack-ceilometer-central-1:10.0.1-6.el7ost.noarch", "product_id": "openstack-ceilometer-central-1:10.0.1-6.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ceilometer-central@10.0.1-6.el7ost?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "openstack-ceilometer-polling-1:10.0.1-6.el7ost.noarch", "product": { "name": "openstack-ceilometer-polling-1:10.0.1-6.el7ost.noarch", "product_id": "openstack-ceilometer-polling-1:10.0.1-6.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ceilometer-polling@10.0.1-6.el7ost?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "openstack-ceilometer-notification-1:10.0.1-6.el7ost.noarch", "product": { "name": "openstack-ceilometer-notification-1:10.0.1-6.el7ost.noarch", "product_id": "openstack-ceilometer-notification-1:10.0.1-6.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ceilometer-notification@10.0.1-6.el7ost?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "openstack-ceilometer-compute-1:10.0.1-6.el7ost.noarch", "product": { "name": "openstack-ceilometer-compute-1:10.0.1-6.el7ost.noarch", "product_id": "openstack-ceilometer-compute-1:10.0.1-6.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ceilometer-compute@10.0.1-6.el7ost?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "python-ceilometer-1:10.0.1-6.el7ost.noarch", "product": { "name": "python-ceilometer-1:10.0.1-6.el7ost.noarch", "product_id": "python-ceilometer-1:10.0.1-6.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-ceilometer@10.0.1-6.el7ost?arch=noarch\u0026epoch=1" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "openstack-ceilometer-1:10.0.1-6.el7ost.src", "product": { "name": "openstack-ceilometer-1:10.0.1-6.el7ost.src", "product_id": "openstack-ceilometer-1:10.0.1-6.el7ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ceilometer@10.0.1-6.el7ost?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openstack-ceilometer-1:10.0.1-6.el7ost.src as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-13.0:openstack-ceilometer-1:10.0.1-6.el7ost.src" }, "product_reference": "openstack-ceilometer-1:10.0.1-6.el7ost.src", "relates_to_product_reference": "7Server-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ceilometer-central-1:10.0.1-6.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-13.0:openstack-ceilometer-central-1:10.0.1-6.el7ost.noarch" }, "product_reference": "openstack-ceilometer-central-1:10.0.1-6.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ceilometer-common-1:10.0.1-6.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-13.0:openstack-ceilometer-common-1:10.0.1-6.el7ost.noarch" }, "product_reference": "openstack-ceilometer-common-1:10.0.1-6.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ceilometer-compute-1:10.0.1-6.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-13.0:openstack-ceilometer-compute-1:10.0.1-6.el7ost.noarch" }, "product_reference": "openstack-ceilometer-compute-1:10.0.1-6.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ceilometer-ipmi-1:10.0.1-6.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-13.0:openstack-ceilometer-ipmi-1:10.0.1-6.el7ost.noarch" }, "product_reference": "openstack-ceilometer-ipmi-1:10.0.1-6.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ceilometer-notification-1:10.0.1-6.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-13.0:openstack-ceilometer-notification-1:10.0.1-6.el7ost.noarch" }, "product_reference": "openstack-ceilometer-notification-1:10.0.1-6.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ceilometer-polling-1:10.0.1-6.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-13.0:openstack-ceilometer-polling-1:10.0.1-6.el7ost.noarch" }, "product_reference": "openstack-ceilometer-polling-1:10.0.1-6.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "python-ceilometer-1:10.0.1-6.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-13.0:python-ceilometer-1:10.0.1-6.el7ost.noarch" }, "product_reference": "python-ceilometer-1:10.0.1-6.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-13.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-3830", "cwe": { "id": "CWE-532", "name": "Insertion of Sensitive Information into Log File" }, "discovery_date": "2019-02-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1677389" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in ceilometer where administrative credentials were permanently stored in the log. A user with access to the logs could obtain these credentials and escalate their privileges.", "title": "Vulnerability description" }, { "category": "summary", "text": "openstack-ceilometer: ceilometer-agent prints sensitive data from config files through log files", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOS-13.0:openstack-ceilometer-1:10.0.1-6.el7ost.src", "7Server-RH7-RHOS-13.0:openstack-ceilometer-central-1:10.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0:openstack-ceilometer-common-1:10.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0:openstack-ceilometer-compute-1:10.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0:openstack-ceilometer-ipmi-1:10.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0:openstack-ceilometer-notification-1:10.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0:openstack-ceilometer-polling-1:10.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0:python-ceilometer-1:10.0.1-6.el7ost.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-3830" }, { "category": "external", "summary": "RHBZ#1677389", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1677389" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-3830", "url": "https://www.cve.org/CVERecord?id=CVE-2019-3830" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3830", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3830" } ], "release_date": "2019-01-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-03-14T13:31:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOS-13.0:openstack-ceilometer-1:10.0.1-6.el7ost.src", "7Server-RH7-RHOS-13.0:openstack-ceilometer-central-1:10.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0:openstack-ceilometer-common-1:10.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0:openstack-ceilometer-compute-1:10.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0:openstack-ceilometer-ipmi-1:10.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0:openstack-ceilometer-notification-1:10.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0:openstack-ceilometer-polling-1:10.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0:python-ceilometer-1:10.0.1-6.el7ost.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:0566" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "7Server-RH7-RHOS-13.0:openstack-ceilometer-1:10.0.1-6.el7ost.src", "7Server-RH7-RHOS-13.0:openstack-ceilometer-central-1:10.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0:openstack-ceilometer-common-1:10.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0:openstack-ceilometer-compute-1:10.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0:openstack-ceilometer-ipmi-1:10.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0:openstack-ceilometer-notification-1:10.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0:openstack-ceilometer-polling-1:10.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0:python-ceilometer-1:10.0.1-6.el7ost.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openstack-ceilometer: ceilometer-agent prints sensitive data from config files through log files" } ] }
rhsa-2019:0580
Vulnerability from csaf_redhat
Published
2019-03-18 12:45
Modified
2024-11-15 05:12
Summary
Red Hat Security Advisory: openstack-ceilometer security and bug fix update
Notes
Topic
An update for openstack-ceilometer is now available for Red Hat OpenStack Platform 14.0 (Rocky).
Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
OpenStack Telemetry (ceilometer) collects customer usage data for metering purposes. Telemetry implements bus listener, push, and polling agents for data collection. This data is stored in a database and presented via the REST API. In addition, Telemetry's extensible design means it can be optionally extended to gather customized data sets.
The following packages have been upgraded to a later upstream version: openstack-ceilometer (11.0.2). (BZ#1677462)
Security Fix(es):
* openstack-ceilometer: ceilometer-agent prints sensitive data from config files through log files (CVE-2019-3830)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for openstack-ceilometer is now available for Red Hat OpenStack Platform 14.0 (Rocky).\n\nRed Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenStack Telemetry (ceilometer) collects customer usage data for metering purposes. Telemetry implements bus listener, push, and polling agents for data collection. This data is stored in a database and presented via the REST API. In addition, Telemetry\u0027s extensible design means it can be optionally extended to gather customized data sets.\n\nThe following packages have been upgraded to a later upstream version: openstack-ceilometer (11.0.2). (BZ#1677462)\n\nSecurity Fix(es):\n\n* openstack-ceilometer: ceilometer-agent prints sensitive data from config files through log files (CVE-2019-3830)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:0580", "url": "https://access.redhat.com/errata/RHSA-2019:0580" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "1671261", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1671261" }, { "category": "external", "summary": "1677389", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1677389" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_0580.json" } ], "title": "Red Hat Security Advisory: openstack-ceilometer security and bug fix update", "tracking": { "current_release_date": "2024-11-15T05:12:54+00:00", "generator": { "date": "2024-11-15T05:12:54+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2019:0580", "initial_release_date": "2019-03-18T12:45:03+00:00", "revision_history": [ { "date": "2019-03-18T12:45:03+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-03-18T12:45:03+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T05:12:54+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenStack Platform 14.0", "product": { "name": "Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:14::el7" } } } ], "category": "product_family", "name": "Red Hat OpenStack Platform" }, { "branches": [ { "category": "product_version", "name": "openstack-ceilometer-1:11.0.2-0.20190117115822.50f268f.el7ost.src", "product": { "name": "openstack-ceilometer-1:11.0.2-0.20190117115822.50f268f.el7ost.src", "product_id": "openstack-ceilometer-1:11.0.2-0.20190117115822.50f268f.el7ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ceilometer@11.0.2-0.20190117115822.50f268f.el7ost?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openstack-ceilometer-central-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "product": { "name": "openstack-ceilometer-central-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "product_id": "openstack-ceilometer-central-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ceilometer-central@11.0.2-0.20190117115822.50f268f.el7ost?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "openstack-ceilometer-compute-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "product": { "name": "openstack-ceilometer-compute-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "product_id": "openstack-ceilometer-compute-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ceilometer-compute@11.0.2-0.20190117115822.50f268f.el7ost?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "openstack-ceilometer-polling-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "product": { "name": "openstack-ceilometer-polling-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "product_id": "openstack-ceilometer-polling-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ceilometer-polling@11.0.2-0.20190117115822.50f268f.el7ost?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "openstack-ceilometer-ipmi-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "product": { "name": "openstack-ceilometer-ipmi-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "product_id": "openstack-ceilometer-ipmi-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ceilometer-ipmi@11.0.2-0.20190117115822.50f268f.el7ost?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "openstack-ceilometer-common-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "product": { "name": "openstack-ceilometer-common-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "product_id": "openstack-ceilometer-common-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ceilometer-common@11.0.2-0.20190117115822.50f268f.el7ost?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "python-ceilometer-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "product": { "name": "python-ceilometer-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "product_id": "python-ceilometer-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-ceilometer@11.0.2-0.20190117115822.50f268f.el7ost?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "openstack-ceilometer-notification-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "product": { "name": "openstack-ceilometer-notification-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "product_id": "openstack-ceilometer-notification-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ceilometer-notification@11.0.2-0.20190117115822.50f268f.el7ost?arch=noarch\u0026epoch=1" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openstack-ceilometer-1:11.0.2-0.20190117115822.50f268f.el7ost.src as a component of Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0:openstack-ceilometer-1:11.0.2-0.20190117115822.50f268f.el7ost.src" }, "product_reference": "openstack-ceilometer-1:11.0.2-0.20190117115822.50f268f.el7ost.src", "relates_to_product_reference": "7Server-RH7-RHOS-14.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ceilometer-central-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch as a component of Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0:openstack-ceilometer-central-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch" }, "product_reference": "openstack-ceilometer-central-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-14.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ceilometer-common-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch as a component of Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0:openstack-ceilometer-common-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch" }, "product_reference": "openstack-ceilometer-common-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-14.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ceilometer-compute-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch as a component of Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0:openstack-ceilometer-compute-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch" }, "product_reference": "openstack-ceilometer-compute-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-14.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ceilometer-ipmi-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch as a component of Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0:openstack-ceilometer-ipmi-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch" }, "product_reference": "openstack-ceilometer-ipmi-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-14.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ceilometer-notification-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch as a component of Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0:openstack-ceilometer-notification-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch" }, "product_reference": "openstack-ceilometer-notification-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-14.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ceilometer-polling-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch as a component of Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0:openstack-ceilometer-polling-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch" }, "product_reference": "openstack-ceilometer-polling-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-14.0" }, { "category": "default_component_of", "full_product_name": { "name": "python-ceilometer-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch as a component of Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0:python-ceilometer-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch" }, "product_reference": "python-ceilometer-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-14.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-3830", "cwe": { "id": "CWE-532", "name": "Insertion of Sensitive Information into Log File" }, "discovery_date": "2019-02-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1677389" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in ceilometer where administrative credentials were permanently stored in the log. A user with access to the logs could obtain these credentials and escalate their privileges.", "title": "Vulnerability description" }, { "category": "summary", "text": "openstack-ceilometer: ceilometer-agent prints sensitive data from config files through log files", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOS-14.0:openstack-ceilometer-1:11.0.2-0.20190117115822.50f268f.el7ost.src", "7Server-RH7-RHOS-14.0:openstack-ceilometer-central-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "7Server-RH7-RHOS-14.0:openstack-ceilometer-common-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "7Server-RH7-RHOS-14.0:openstack-ceilometer-compute-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "7Server-RH7-RHOS-14.0:openstack-ceilometer-ipmi-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "7Server-RH7-RHOS-14.0:openstack-ceilometer-notification-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "7Server-RH7-RHOS-14.0:openstack-ceilometer-polling-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "7Server-RH7-RHOS-14.0:python-ceilometer-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-3830" }, { "category": "external", "summary": "RHBZ#1677389", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1677389" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-3830", "url": "https://www.cve.org/CVERecord?id=CVE-2019-3830" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3830", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3830" } ], "release_date": "2019-01-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-03-18T12:45:03+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOS-14.0:openstack-ceilometer-1:11.0.2-0.20190117115822.50f268f.el7ost.src", "7Server-RH7-RHOS-14.0:openstack-ceilometer-central-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "7Server-RH7-RHOS-14.0:openstack-ceilometer-common-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "7Server-RH7-RHOS-14.0:openstack-ceilometer-compute-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "7Server-RH7-RHOS-14.0:openstack-ceilometer-ipmi-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "7Server-RH7-RHOS-14.0:openstack-ceilometer-notification-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "7Server-RH7-RHOS-14.0:openstack-ceilometer-polling-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "7Server-RH7-RHOS-14.0:python-ceilometer-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:0580" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "7Server-RH7-RHOS-14.0:openstack-ceilometer-1:11.0.2-0.20190117115822.50f268f.el7ost.src", "7Server-RH7-RHOS-14.0:openstack-ceilometer-central-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "7Server-RH7-RHOS-14.0:openstack-ceilometer-common-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "7Server-RH7-RHOS-14.0:openstack-ceilometer-compute-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "7Server-RH7-RHOS-14.0:openstack-ceilometer-ipmi-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "7Server-RH7-RHOS-14.0:openstack-ceilometer-notification-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "7Server-RH7-RHOS-14.0:openstack-ceilometer-polling-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "7Server-RH7-RHOS-14.0:python-ceilometer-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openstack-ceilometer: ceilometer-agent prints sensitive data from config files through log files" } ] }
rhsa-2019_0919
Vulnerability from csaf_redhat
Published
2019-04-30 17:03
Modified
2024-11-15 05:13
Summary
Red Hat Security Advisory: openstack-ceilometer security update
Notes
Topic
An update for openstack-ceilometer is now available for Red Hat OpenStack Platform 10.0 (Newton).
Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
OpenStack Telemetry (ceilometer) collects customer usage data for metering purposes. Telemetry implements bus listener, push, and polling agents for data collection. This data is stored in a database and presented via the REST API. In addition, Telemetry's extensible design means it can be optionally extended to gather customized data sets.
Security Fix(es):
* openstack-ceilometer: ceilometer-agent prints sensitive data from config files through log files (CVE-2019-3830)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for openstack-ceilometer is now available for Red Hat OpenStack Platform 10.0 (Newton).\n\nRed Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenStack Telemetry (ceilometer) collects customer usage data for metering purposes. Telemetry implements bus listener, push, and polling agents for data collection. This data is stored in a database and presented via the REST API. In addition, Telemetry\u0027s extensible design means it can be optionally extended to gather customized data sets.\n\nSecurity Fix(es):\n\n* openstack-ceilometer: ceilometer-agent prints sensitive data from config files through log files (CVE-2019-3830)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:0919", "url": "https://access.redhat.com/errata/RHSA-2019:0919" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "1677389", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1677389" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_0919.json" } ], "title": "Red Hat Security Advisory: openstack-ceilometer security update", "tracking": { "current_release_date": "2024-11-15T05:13:49+00:00", "generator": { "date": "2024-11-15T05:13:49+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2019:0919", "initial_release_date": "2019-04-30T17:03:12+00:00", "revision_history": [ { "date": "2019-04-30T17:03:12+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-04-30T17:03:12+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T05:13:49+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenStack Platform 10.0", "product": { "name": "Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:10::el7" } } } ], "category": "product_family", "name": "Red Hat OpenStack Platform" }, { "branches": [ { "category": "product_version", "name": "openstack-ceilometer-api-1:7.1.1-9.el7ost.noarch", "product": { "name": "openstack-ceilometer-api-1:7.1.1-9.el7ost.noarch", "product_id": "openstack-ceilometer-api-1:7.1.1-9.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ceilometer-api@7.1.1-9.el7ost?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "python-ceilometer-tests-1:7.1.1-9.el7ost.noarch", "product": { "name": "python-ceilometer-tests-1:7.1.1-9.el7ost.noarch", "product_id": "python-ceilometer-tests-1:7.1.1-9.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-ceilometer-tests@7.1.1-9.el7ost?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "openstack-ceilometer-common-1:7.1.1-9.el7ost.noarch", "product": { "name": "openstack-ceilometer-common-1:7.1.1-9.el7ost.noarch", "product_id": "openstack-ceilometer-common-1:7.1.1-9.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ceilometer-common@7.1.1-9.el7ost?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "openstack-ceilometer-notification-1:7.1.1-9.el7ost.noarch", "product": { "name": "openstack-ceilometer-notification-1:7.1.1-9.el7ost.noarch", "product_id": "openstack-ceilometer-notification-1:7.1.1-9.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ceilometer-notification@7.1.1-9.el7ost?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "openstack-ceilometer-collector-1:7.1.1-9.el7ost.noarch", "product": { "name": "openstack-ceilometer-collector-1:7.1.1-9.el7ost.noarch", "product_id": "openstack-ceilometer-collector-1:7.1.1-9.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ceilometer-collector@7.1.1-9.el7ost?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "openstack-ceilometer-polling-1:7.1.1-9.el7ost.noarch", "product": { "name": "openstack-ceilometer-polling-1:7.1.1-9.el7ost.noarch", "product_id": "openstack-ceilometer-polling-1:7.1.1-9.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ceilometer-polling@7.1.1-9.el7ost?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "python-ceilometer-1:7.1.1-9.el7ost.noarch", "product": { "name": "python-ceilometer-1:7.1.1-9.el7ost.noarch", "product_id": "python-ceilometer-1:7.1.1-9.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-ceilometer@7.1.1-9.el7ost?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "openstack-ceilometer-ipmi-1:7.1.1-9.el7ost.noarch", "product": { "name": "openstack-ceilometer-ipmi-1:7.1.1-9.el7ost.noarch", "product_id": "openstack-ceilometer-ipmi-1:7.1.1-9.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ceilometer-ipmi@7.1.1-9.el7ost?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "openstack-ceilometer-compute-1:7.1.1-9.el7ost.noarch", "product": { "name": "openstack-ceilometer-compute-1:7.1.1-9.el7ost.noarch", "product_id": "openstack-ceilometer-compute-1:7.1.1-9.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ceilometer-compute@7.1.1-9.el7ost?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "openstack-ceilometer-central-1:7.1.1-9.el7ost.noarch", "product": { "name": "openstack-ceilometer-central-1:7.1.1-9.el7ost.noarch", "product_id": "openstack-ceilometer-central-1:7.1.1-9.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ceilometer-central@7.1.1-9.el7ost?arch=noarch\u0026epoch=1" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "openstack-ceilometer-1:7.1.1-9.el7ost.src", "product": { "name": "openstack-ceilometer-1:7.1.1-9.el7ost.src", "product_id": "openstack-ceilometer-1:7.1.1-9.el7ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ceilometer@7.1.1-9.el7ost?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openstack-ceilometer-1:7.1.1-9.el7ost.src as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:openstack-ceilometer-1:7.1.1-9.el7ost.src" }, "product_reference": "openstack-ceilometer-1:7.1.1-9.el7ost.src", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ceilometer-api-1:7.1.1-9.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:openstack-ceilometer-api-1:7.1.1-9.el7ost.noarch" }, "product_reference": "openstack-ceilometer-api-1:7.1.1-9.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ceilometer-central-1:7.1.1-9.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:openstack-ceilometer-central-1:7.1.1-9.el7ost.noarch" }, "product_reference": "openstack-ceilometer-central-1:7.1.1-9.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ceilometer-collector-1:7.1.1-9.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:openstack-ceilometer-collector-1:7.1.1-9.el7ost.noarch" }, "product_reference": "openstack-ceilometer-collector-1:7.1.1-9.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ceilometer-common-1:7.1.1-9.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:openstack-ceilometer-common-1:7.1.1-9.el7ost.noarch" }, "product_reference": "openstack-ceilometer-common-1:7.1.1-9.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ceilometer-compute-1:7.1.1-9.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:openstack-ceilometer-compute-1:7.1.1-9.el7ost.noarch" }, "product_reference": "openstack-ceilometer-compute-1:7.1.1-9.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ceilometer-ipmi-1:7.1.1-9.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:openstack-ceilometer-ipmi-1:7.1.1-9.el7ost.noarch" }, "product_reference": "openstack-ceilometer-ipmi-1:7.1.1-9.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ceilometer-notification-1:7.1.1-9.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:openstack-ceilometer-notification-1:7.1.1-9.el7ost.noarch" }, "product_reference": "openstack-ceilometer-notification-1:7.1.1-9.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ceilometer-polling-1:7.1.1-9.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:openstack-ceilometer-polling-1:7.1.1-9.el7ost.noarch" }, "product_reference": "openstack-ceilometer-polling-1:7.1.1-9.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "python-ceilometer-1:7.1.1-9.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:python-ceilometer-1:7.1.1-9.el7ost.noarch" }, "product_reference": "python-ceilometer-1:7.1.1-9.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" }, { "category": "default_component_of", "full_product_name": { "name": "python-ceilometer-tests-1:7.1.1-9.el7ost.noarch as a component of Red Hat OpenStack Platform 10.0", "product_id": "7Server-RH7-RHOS-10.0:python-ceilometer-tests-1:7.1.1-9.el7ost.noarch" }, "product_reference": "python-ceilometer-tests-1:7.1.1-9.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-10.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-3830", "cwe": { "id": "CWE-532", "name": "Insertion of Sensitive Information into Log File" }, "discovery_date": "2019-02-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1677389" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in ceilometer where administrative credentials were permanently stored in the log. A user with access to the logs could obtain these credentials and escalate their privileges.", "title": "Vulnerability description" }, { "category": "summary", "text": "openstack-ceilometer: ceilometer-agent prints sensitive data from config files through log files", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOS-10.0:openstack-ceilometer-1:7.1.1-9.el7ost.src", "7Server-RH7-RHOS-10.0:openstack-ceilometer-api-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-ceilometer-central-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-ceilometer-collector-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-ceilometer-common-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-ceilometer-compute-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-ceilometer-ipmi-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-ceilometer-notification-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-ceilometer-polling-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:python-ceilometer-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:python-ceilometer-tests-1:7.1.1-9.el7ost.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-3830" }, { "category": "external", "summary": "RHBZ#1677389", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1677389" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-3830", "url": "https://www.cve.org/CVERecord?id=CVE-2019-3830" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3830", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3830" } ], "release_date": "2019-01-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-04-30T17:03:12+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOS-10.0:openstack-ceilometer-1:7.1.1-9.el7ost.src", "7Server-RH7-RHOS-10.0:openstack-ceilometer-api-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-ceilometer-central-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-ceilometer-collector-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-ceilometer-common-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-ceilometer-compute-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-ceilometer-ipmi-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-ceilometer-notification-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-ceilometer-polling-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:python-ceilometer-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:python-ceilometer-tests-1:7.1.1-9.el7ost.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:0919" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "7Server-RH7-RHOS-10.0:openstack-ceilometer-1:7.1.1-9.el7ost.src", "7Server-RH7-RHOS-10.0:openstack-ceilometer-api-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-ceilometer-central-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-ceilometer-collector-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-ceilometer-common-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-ceilometer-compute-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-ceilometer-ipmi-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-ceilometer-notification-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:openstack-ceilometer-polling-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:python-ceilometer-1:7.1.1-9.el7ost.noarch", "7Server-RH7-RHOS-10.0:python-ceilometer-tests-1:7.1.1-9.el7ost.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openstack-ceilometer: ceilometer-agent prints sensitive data from config files through log files" } ] }
RHSA-2019:0566
Vulnerability from csaf_redhat
Published
2019-03-14 13:31
Modified
2024-11-15 05:12
Summary
Red Hat Security Advisory: openstack-ceilometer security and bug fix update
Notes
Topic
An update for openstack-ceilometer is now available for Red Hat OpenStack Platform 13.0 (Queens).
Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
OpenStack Telemetry (ceilometer) collects customer usage data for metering purposes. Telemetry implements bus listener, push, and polling agents for data collection. This data is stored in a database and presented via the REST API. In addition, Telemetry's extensible design means it can be optionally extended to gather customized data sets.
Security Fix(es):
* openstack-ceilometer: ceilometer-agent prints sensitive data from config files through log files (CVE-2019-3830)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for openstack-ceilometer is now available for Red Hat OpenStack Platform 13.0 (Queens).\n\nRed Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenStack Telemetry (ceilometer) collects customer usage data for metering purposes. Telemetry implements bus listener, push, and polling agents for data collection. This data is stored in a database and presented via the REST API. In addition, Telemetry\u0027s extensible design means it can be optionally extended to gather customized data sets.\n\nSecurity Fix(es):\n\n* openstack-ceilometer: ceilometer-agent prints sensitive data from config files through log files (CVE-2019-3830)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:0566", "url": "https://access.redhat.com/errata/RHSA-2019:0566" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "1659044", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1659044" }, { "category": "external", "summary": "1669296", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1669296" }, { "category": "external", "summary": "1671037", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1671037" }, { "category": "external", "summary": "1677389", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1677389" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_0566.json" } ], "title": "Red Hat Security Advisory: openstack-ceilometer security and bug fix update", "tracking": { "current_release_date": "2024-11-15T05:12:42+00:00", "generator": { "date": "2024-11-15T05:12:42+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2019:0566", "initial_release_date": "2019-03-14T13:31:51+00:00", "revision_history": [ { "date": "2019-03-14T13:31:51+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-03-14T13:31:51+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T05:12:42+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenStack Platform 13.0", "product": { "name": "Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-13.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:13::el7" } } } ], "category": "product_family", "name": "Red Hat OpenStack Platform" }, { "branches": [ { "category": "product_version", "name": "openstack-ceilometer-common-1:10.0.1-6.el7ost.noarch", "product": { "name": "openstack-ceilometer-common-1:10.0.1-6.el7ost.noarch", "product_id": "openstack-ceilometer-common-1:10.0.1-6.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ceilometer-common@10.0.1-6.el7ost?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "openstack-ceilometer-ipmi-1:10.0.1-6.el7ost.noarch", "product": { "name": "openstack-ceilometer-ipmi-1:10.0.1-6.el7ost.noarch", "product_id": "openstack-ceilometer-ipmi-1:10.0.1-6.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ceilometer-ipmi@10.0.1-6.el7ost?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "openstack-ceilometer-central-1:10.0.1-6.el7ost.noarch", "product": { "name": "openstack-ceilometer-central-1:10.0.1-6.el7ost.noarch", "product_id": "openstack-ceilometer-central-1:10.0.1-6.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ceilometer-central@10.0.1-6.el7ost?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "openstack-ceilometer-polling-1:10.0.1-6.el7ost.noarch", "product": { "name": "openstack-ceilometer-polling-1:10.0.1-6.el7ost.noarch", "product_id": "openstack-ceilometer-polling-1:10.0.1-6.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ceilometer-polling@10.0.1-6.el7ost?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "openstack-ceilometer-notification-1:10.0.1-6.el7ost.noarch", "product": { "name": "openstack-ceilometer-notification-1:10.0.1-6.el7ost.noarch", "product_id": "openstack-ceilometer-notification-1:10.0.1-6.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ceilometer-notification@10.0.1-6.el7ost?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "openstack-ceilometer-compute-1:10.0.1-6.el7ost.noarch", "product": { "name": "openstack-ceilometer-compute-1:10.0.1-6.el7ost.noarch", "product_id": "openstack-ceilometer-compute-1:10.0.1-6.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ceilometer-compute@10.0.1-6.el7ost?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "python-ceilometer-1:10.0.1-6.el7ost.noarch", "product": { "name": "python-ceilometer-1:10.0.1-6.el7ost.noarch", "product_id": "python-ceilometer-1:10.0.1-6.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-ceilometer@10.0.1-6.el7ost?arch=noarch\u0026epoch=1" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "openstack-ceilometer-1:10.0.1-6.el7ost.src", "product": { "name": "openstack-ceilometer-1:10.0.1-6.el7ost.src", "product_id": "openstack-ceilometer-1:10.0.1-6.el7ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ceilometer@10.0.1-6.el7ost?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openstack-ceilometer-1:10.0.1-6.el7ost.src as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-13.0:openstack-ceilometer-1:10.0.1-6.el7ost.src" }, "product_reference": "openstack-ceilometer-1:10.0.1-6.el7ost.src", "relates_to_product_reference": "7Server-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ceilometer-central-1:10.0.1-6.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-13.0:openstack-ceilometer-central-1:10.0.1-6.el7ost.noarch" }, "product_reference": "openstack-ceilometer-central-1:10.0.1-6.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ceilometer-common-1:10.0.1-6.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-13.0:openstack-ceilometer-common-1:10.0.1-6.el7ost.noarch" }, "product_reference": "openstack-ceilometer-common-1:10.0.1-6.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ceilometer-compute-1:10.0.1-6.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-13.0:openstack-ceilometer-compute-1:10.0.1-6.el7ost.noarch" }, "product_reference": "openstack-ceilometer-compute-1:10.0.1-6.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ceilometer-ipmi-1:10.0.1-6.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-13.0:openstack-ceilometer-ipmi-1:10.0.1-6.el7ost.noarch" }, "product_reference": "openstack-ceilometer-ipmi-1:10.0.1-6.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ceilometer-notification-1:10.0.1-6.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-13.0:openstack-ceilometer-notification-1:10.0.1-6.el7ost.noarch" }, "product_reference": "openstack-ceilometer-notification-1:10.0.1-6.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ceilometer-polling-1:10.0.1-6.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-13.0:openstack-ceilometer-polling-1:10.0.1-6.el7ost.noarch" }, "product_reference": "openstack-ceilometer-polling-1:10.0.1-6.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-13.0" }, { "category": "default_component_of", "full_product_name": { "name": "python-ceilometer-1:10.0.1-6.el7ost.noarch as a component of Red Hat OpenStack Platform 13.0", "product_id": "7Server-RH7-RHOS-13.0:python-ceilometer-1:10.0.1-6.el7ost.noarch" }, "product_reference": "python-ceilometer-1:10.0.1-6.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-13.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-3830", "cwe": { "id": "CWE-532", "name": "Insertion of Sensitive Information into Log File" }, "discovery_date": "2019-02-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1677389" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in ceilometer where administrative credentials were permanently stored in the log. A user with access to the logs could obtain these credentials and escalate their privileges.", "title": "Vulnerability description" }, { "category": "summary", "text": "openstack-ceilometer: ceilometer-agent prints sensitive data from config files through log files", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOS-13.0:openstack-ceilometer-1:10.0.1-6.el7ost.src", "7Server-RH7-RHOS-13.0:openstack-ceilometer-central-1:10.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0:openstack-ceilometer-common-1:10.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0:openstack-ceilometer-compute-1:10.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0:openstack-ceilometer-ipmi-1:10.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0:openstack-ceilometer-notification-1:10.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0:openstack-ceilometer-polling-1:10.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0:python-ceilometer-1:10.0.1-6.el7ost.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-3830" }, { "category": "external", "summary": "RHBZ#1677389", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1677389" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-3830", "url": "https://www.cve.org/CVERecord?id=CVE-2019-3830" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3830", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3830" } ], "release_date": "2019-01-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-03-14T13:31:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOS-13.0:openstack-ceilometer-1:10.0.1-6.el7ost.src", "7Server-RH7-RHOS-13.0:openstack-ceilometer-central-1:10.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0:openstack-ceilometer-common-1:10.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0:openstack-ceilometer-compute-1:10.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0:openstack-ceilometer-ipmi-1:10.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0:openstack-ceilometer-notification-1:10.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0:openstack-ceilometer-polling-1:10.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0:python-ceilometer-1:10.0.1-6.el7ost.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:0566" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "7Server-RH7-RHOS-13.0:openstack-ceilometer-1:10.0.1-6.el7ost.src", "7Server-RH7-RHOS-13.0:openstack-ceilometer-central-1:10.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0:openstack-ceilometer-common-1:10.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0:openstack-ceilometer-compute-1:10.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0:openstack-ceilometer-ipmi-1:10.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0:openstack-ceilometer-notification-1:10.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0:openstack-ceilometer-polling-1:10.0.1-6.el7ost.noarch", "7Server-RH7-RHOS-13.0:python-ceilometer-1:10.0.1-6.el7ost.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openstack-ceilometer: ceilometer-agent prints sensitive data from config files through log files" } ] }
rhsa-2019_0580
Vulnerability from csaf_redhat
Published
2019-03-18 12:45
Modified
2024-11-15 05:12
Summary
Red Hat Security Advisory: openstack-ceilometer security and bug fix update
Notes
Topic
An update for openstack-ceilometer is now available for Red Hat OpenStack Platform 14.0 (Rocky).
Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
OpenStack Telemetry (ceilometer) collects customer usage data for metering purposes. Telemetry implements bus listener, push, and polling agents for data collection. This data is stored in a database and presented via the REST API. In addition, Telemetry's extensible design means it can be optionally extended to gather customized data sets.
The following packages have been upgraded to a later upstream version: openstack-ceilometer (11.0.2). (BZ#1677462)
Security Fix(es):
* openstack-ceilometer: ceilometer-agent prints sensitive data from config files through log files (CVE-2019-3830)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for openstack-ceilometer is now available for Red Hat OpenStack Platform 14.0 (Rocky).\n\nRed Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenStack Telemetry (ceilometer) collects customer usage data for metering purposes. Telemetry implements bus listener, push, and polling agents for data collection. This data is stored in a database and presented via the REST API. In addition, Telemetry\u0027s extensible design means it can be optionally extended to gather customized data sets.\n\nThe following packages have been upgraded to a later upstream version: openstack-ceilometer (11.0.2). (BZ#1677462)\n\nSecurity Fix(es):\n\n* openstack-ceilometer: ceilometer-agent prints sensitive data from config files through log files (CVE-2019-3830)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:0580", "url": "https://access.redhat.com/errata/RHSA-2019:0580" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "1671261", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1671261" }, { "category": "external", "summary": "1677389", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1677389" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_0580.json" } ], "title": "Red Hat Security Advisory: openstack-ceilometer security and bug fix update", "tracking": { "current_release_date": "2024-11-15T05:12:54+00:00", "generator": { "date": "2024-11-15T05:12:54+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2019:0580", "initial_release_date": "2019-03-18T12:45:03+00:00", "revision_history": [ { "date": "2019-03-18T12:45:03+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-03-18T12:45:03+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T05:12:54+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenStack Platform 14.0", "product": { "name": "Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:14::el7" } } } ], "category": "product_family", "name": "Red Hat OpenStack Platform" }, { "branches": [ { "category": "product_version", "name": "openstack-ceilometer-1:11.0.2-0.20190117115822.50f268f.el7ost.src", "product": { "name": "openstack-ceilometer-1:11.0.2-0.20190117115822.50f268f.el7ost.src", "product_id": "openstack-ceilometer-1:11.0.2-0.20190117115822.50f268f.el7ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ceilometer@11.0.2-0.20190117115822.50f268f.el7ost?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openstack-ceilometer-central-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "product": { "name": "openstack-ceilometer-central-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "product_id": "openstack-ceilometer-central-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ceilometer-central@11.0.2-0.20190117115822.50f268f.el7ost?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "openstack-ceilometer-compute-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "product": { "name": "openstack-ceilometer-compute-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "product_id": "openstack-ceilometer-compute-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ceilometer-compute@11.0.2-0.20190117115822.50f268f.el7ost?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "openstack-ceilometer-polling-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "product": { "name": "openstack-ceilometer-polling-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "product_id": "openstack-ceilometer-polling-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ceilometer-polling@11.0.2-0.20190117115822.50f268f.el7ost?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "openstack-ceilometer-ipmi-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "product": { "name": "openstack-ceilometer-ipmi-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "product_id": "openstack-ceilometer-ipmi-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ceilometer-ipmi@11.0.2-0.20190117115822.50f268f.el7ost?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "openstack-ceilometer-common-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "product": { "name": "openstack-ceilometer-common-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "product_id": "openstack-ceilometer-common-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ceilometer-common@11.0.2-0.20190117115822.50f268f.el7ost?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "python-ceilometer-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "product": { "name": "python-ceilometer-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "product_id": "python-ceilometer-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-ceilometer@11.0.2-0.20190117115822.50f268f.el7ost?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "openstack-ceilometer-notification-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "product": { "name": "openstack-ceilometer-notification-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "product_id": "openstack-ceilometer-notification-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ceilometer-notification@11.0.2-0.20190117115822.50f268f.el7ost?arch=noarch\u0026epoch=1" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openstack-ceilometer-1:11.0.2-0.20190117115822.50f268f.el7ost.src as a component of Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0:openstack-ceilometer-1:11.0.2-0.20190117115822.50f268f.el7ost.src" }, "product_reference": "openstack-ceilometer-1:11.0.2-0.20190117115822.50f268f.el7ost.src", "relates_to_product_reference": "7Server-RH7-RHOS-14.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ceilometer-central-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch as a component of Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0:openstack-ceilometer-central-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch" }, "product_reference": "openstack-ceilometer-central-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-14.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ceilometer-common-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch as a component of Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0:openstack-ceilometer-common-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch" }, "product_reference": "openstack-ceilometer-common-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-14.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ceilometer-compute-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch as a component of Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0:openstack-ceilometer-compute-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch" }, "product_reference": "openstack-ceilometer-compute-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-14.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ceilometer-ipmi-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch as a component of Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0:openstack-ceilometer-ipmi-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch" }, "product_reference": "openstack-ceilometer-ipmi-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-14.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ceilometer-notification-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch as a component of Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0:openstack-ceilometer-notification-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch" }, "product_reference": "openstack-ceilometer-notification-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-14.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ceilometer-polling-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch as a component of Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0:openstack-ceilometer-polling-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch" }, "product_reference": "openstack-ceilometer-polling-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-14.0" }, { "category": "default_component_of", "full_product_name": { "name": "python-ceilometer-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch as a component of Red Hat OpenStack Platform 14.0", "product_id": "7Server-RH7-RHOS-14.0:python-ceilometer-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch" }, "product_reference": "python-ceilometer-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-14.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-3830", "cwe": { "id": "CWE-532", "name": "Insertion of Sensitive Information into Log File" }, "discovery_date": "2019-02-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1677389" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in ceilometer where administrative credentials were permanently stored in the log. A user with access to the logs could obtain these credentials and escalate their privileges.", "title": "Vulnerability description" }, { "category": "summary", "text": "openstack-ceilometer: ceilometer-agent prints sensitive data from config files through log files", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOS-14.0:openstack-ceilometer-1:11.0.2-0.20190117115822.50f268f.el7ost.src", "7Server-RH7-RHOS-14.0:openstack-ceilometer-central-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "7Server-RH7-RHOS-14.0:openstack-ceilometer-common-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "7Server-RH7-RHOS-14.0:openstack-ceilometer-compute-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "7Server-RH7-RHOS-14.0:openstack-ceilometer-ipmi-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "7Server-RH7-RHOS-14.0:openstack-ceilometer-notification-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "7Server-RH7-RHOS-14.0:openstack-ceilometer-polling-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "7Server-RH7-RHOS-14.0:python-ceilometer-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-3830" }, { "category": "external", "summary": "RHBZ#1677389", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1677389" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-3830", "url": "https://www.cve.org/CVERecord?id=CVE-2019-3830" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3830", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3830" } ], "release_date": "2019-01-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-03-18T12:45:03+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOS-14.0:openstack-ceilometer-1:11.0.2-0.20190117115822.50f268f.el7ost.src", "7Server-RH7-RHOS-14.0:openstack-ceilometer-central-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "7Server-RH7-RHOS-14.0:openstack-ceilometer-common-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "7Server-RH7-RHOS-14.0:openstack-ceilometer-compute-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "7Server-RH7-RHOS-14.0:openstack-ceilometer-ipmi-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "7Server-RH7-RHOS-14.0:openstack-ceilometer-notification-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "7Server-RH7-RHOS-14.0:openstack-ceilometer-polling-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "7Server-RH7-RHOS-14.0:python-ceilometer-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:0580" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "7Server-RH7-RHOS-14.0:openstack-ceilometer-1:11.0.2-0.20190117115822.50f268f.el7ost.src", "7Server-RH7-RHOS-14.0:openstack-ceilometer-central-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "7Server-RH7-RHOS-14.0:openstack-ceilometer-common-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "7Server-RH7-RHOS-14.0:openstack-ceilometer-compute-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "7Server-RH7-RHOS-14.0:openstack-ceilometer-ipmi-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "7Server-RH7-RHOS-14.0:openstack-ceilometer-notification-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "7Server-RH7-RHOS-14.0:openstack-ceilometer-polling-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch", "7Server-RH7-RHOS-14.0:python-ceilometer-1:11.0.2-0.20190117115822.50f268f.el7ost.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openstack-ceilometer: ceilometer-agent prints sensitive data from config files through log files" } ] }
cve-2019-3830
Vulnerability from fkie_nvd
Published
2019-03-26 18:29
Modified
2024-11-21 04:42
Severity ?
Summary
A vulnerability was found in ceilometer before version 12.0.0.0rc1. An Information Exposure in ceilometer-agent prints sensitive configuration data to log files without DEBUG logging being activated.
References
▼ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | https://access.redhat.com/errata/RHSA-2019:0919 | Third Party Advisory | |
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3830 | Issue Tracking, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2019:0919 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3830 | Issue Tracking, Patch, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openstack | ceilometer | * | |
openstack | ceilometer | * | |
redhat | openstack | 10 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openstack:ceilometer:*:*:*:*:*:*:*:*", "matchCriteriaId": "8991F919-7FD7-4BD0-A576-9A7CBB3B2841", "versionEndIncluding": "11.01", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:ceilometer:*:*:*:*:*:*:*:*", "matchCriteriaId": "6FBA7AED-4378-4E2B-9EB4-E3746EA00949", "versionEndIncluding": "2015.1.4", "versionStartIncluding": "2013.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:*", "matchCriteriaId": "E722FEF7-58A6-47AD-B1D0-DB0B71B0C7AA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in ceilometer before version 12.0.0.0rc1. An Information Exposure in ceilometer-agent prints sensitive configuration data to log files without DEBUG logging being activated." }, { "lang": "es", "value": "Se ha detectado una vulnerabilidad en ceilometer, en versiones anteriores a la 12.0.0.0rc1. Una exposici\u00f3n de informaci\u00f3n en ceilometer-agent imprime los datos sensibles de configuraci\u00f3n en archivos de registro sin que est\u00e9 activado el registro de DEBUG." } ], "id": "CVE-2019-3830", "lastModified": "2024-11-21T04:42:38.093", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 2.5, "impactScore": 1.4, "source": "secalert@redhat.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-03-26T18:29:00.700", "references": [ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:0919" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3830" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:0919" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3830" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-532" } ], "source": "secalert@redhat.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-532" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
pysec-2019-78
Vulnerability from pysec
Published
2019-03-26 18:29
Modified
2020-10-22 14:44
Details
A vulnerability was found in ceilometer before version 12.0.0.0rc1. An Information Exposure in ceilometer-agent prints sensitive configuration data to log files without DEBUG logging being activated.
Aliases
{ "affected": [ { "package": { "ecosystem": "PyPI", "name": "ceilometer", "purl": "pkg:pypi/ceilometer" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "12.0.0.0rc1" } ], "type": "ECOSYSTEM" } ], "versions": [ "0.1", "0.2", "8.1.5", "9.0.6", "9.0.7", "10.0.1", "11.0.0", "11.0.1", "11.1.0" ] } ], "aliases": [ "CVE-2019-3830" ], "details": "A vulnerability was found in ceilometer before version 12.0.0.0rc1. An Information Exposure in ceilometer-agent prints sensitive configuration data to log files without DEBUG logging being activated.", "id": "PYSEC-2019-78", "modified": "2020-10-22T14:44:00Z", "published": "2019-03-26T18:29:00Z", "references": [ { "type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3830" }, { "type": "ADVISORY", "url": "https://access.redhat.com/errata/RHSA-2019:0919" } ] }
gsd-2019-3830
Vulnerability from gsd
Modified
2023-12-13 01:24
Details
A vulnerability was found in ceilometer before version 12.0.0.0rc1. An Information Exposure in ceilometer-agent prints sensitive configuration data to log files without DEBUG logging being activated.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2019-3830", "description": "A vulnerability was found in ceilometer before version 12.0.0.0rc1. An Information Exposure in ceilometer-agent prints sensitive configuration data to log files without DEBUG logging being activated.", "id": "GSD-2019-3830", "references": [ "https://www.suse.com/security/cve/CVE-2019-3830.html", "https://access.redhat.com/errata/RHSA-2019:0919", "https://access.redhat.com/errata/RHSA-2019:0580", "https://access.redhat.com/errata/RHSA-2019:0566" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2019-3830" ], "details": "A vulnerability was found in ceilometer before version 12.0.0.0rc1. An Information Exposure in ceilometer-agent prints sensitive configuration data to log files without DEBUG logging being activated.", "id": "GSD-2019-3830", "modified": "2023-12-13T01:24:04.772515Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2019-3830", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "openstack-ceilometer", "version": { "version_data": [ { "version_value": "fixed in 12.0.0.0rc1" } ] } } ] }, "vendor_name": "[UNKNOWN]" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability was found in ceilometer before version 12.0.0.0rc1. An Information Exposure in ceilometer-agent prints sensitive configuration data to log files without DEBUG logging being activated." } ] }, "impact": { "cvss": [ [ { "vectorString": "4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } ] ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-532" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3830", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3830" }, { "name": "RHSA-2019:0919", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:0919" } ] } }, "gitlab.com": { "advisories": [ { "affected_range": "\u003c12.0.0.0rc1", "affected_versions": "All versions before 12.0.0.0rc1", "cvss_v2": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "cvss_v3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "cwe_ids": [ "CWE-1035", "CWE-532", "CWE-937" ], "date": "2023-07-19", "description": "A vulnerability was found in ceilometer before version 12.0.0.0rc1. An Information Exposure in ceilometer-agent prints sensitive configuration data to log files without DEBUG logging being activated.", "fixed_versions": [ "12.0.0.0rc1" ], "identifier": "CVE-2019-3830", "identifiers": [ "GHSA-2cvf-r9jm-4qm9", "CVE-2019-3830" ], "not_impacted": "All versions starting from 12.0.0.0rc1", "package_slug": "pypi/ceilometer", "pubdate": "2022-05-13", "solution": "Upgrade to version 12.0.0.0rc1 or above.", "title": "Insertion of Sensitive Information into Log File", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2019-3830", "https://access.redhat.com/errata/RHSA-2019:0919", "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3830", "https://github.com/openstack/ceilometer/commit/8881a42af169a2d7c912b1434911f978883c83f3#diff-f2d2273521cce7e69f7032c6185936736a5acc70b2b2f90d956b9a7998b087cd", "https://github.com/advisories/GHSA-2cvf-r9jm-4qm9" ], "uuid": "5fa0cd6b-0672-49cd-9540-8553f7624ec1" } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:openstack:ceilometer:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "11.01", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openstack:ceilometer:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2015.1.4", "versionStartIncluding": "2013.1", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2019-3830" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "A vulnerability was found in ceilometer before version 12.0.0.0rc1. An Information Exposure in ceilometer-agent prints sensitive configuration data to log files without DEBUG logging being activated." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-532" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3830", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3830" }, { "name": "RHSA-2019:0919", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:0919" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9 } }, "lastModifiedDate": "2020-10-22T14:44Z", "publishedDate": "2019-03-26T18:29Z" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.