Make the checks in strutils.mask_password more secure (CVE-2014-7231)
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
OpenStack Compute (nova) |
Invalid
|
Undecided
|
Unassigned | ||
Havana |
Fix Released
|
Undecided
|
Unassigned | ||
Icehouse |
Fix Released
|
Undecided
|
Unassigned | ||
oslo.utils |
Fix Released
|
Medium
|
Amrith Kumar |
Bug Description
Relates to findings while fixing https:/
mask_password() needs to be more robust and catch many more common formats of strings that could include passwords.
An example is that it does not catch something like '--password=
/usr/sbin/mysqld --password=
2014-07-19 18:35:01.415 20588 ERROR openstack.
They did catch
/usr/sbin/mysqld --password=
2014-07-19 18:35:48.686 20605 ERROR openstack.
CVE References
Changed in oslo: | |
assignee: | nobody → Amrith (amrith) |
Changed in ossa: | |
assignee: | nobody → Amrith (amrith) |
information type: | Private Security → Public Security |
Changed in ossa: | |
status: | New → Confirmed |
importance: | Undecided → Medium |
Changed in ossa: | |
assignee: | nobody → Tristan Cacqueray (tristan-cacqueray) |
Changed in ossa: | |
status: | Confirmed → Triaged |
Changed in oslo: | |
importance: | Undecided → Medium |
status: | New → Triaged |
affects: | oslo-incubator → oslo.utils |
summary: |
- Make the checks in strutils.mask_password more secure + Make the checks in strutils.mask_password more secure (CVE-2014-7231) |
Changed in nova: | |
status: | New → Invalid |
no longer affects: | nova/juno |
We are going to take care of the OSSA task within the former report: /bugs.launchpad .net/ossa/ +bug/1343604
https:/
Can we mark this bug as a duplicate of 1343604 ?