Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 467054 (CVE-2013-2006)

Summary: <sys-auth/keystone-2013.1-r1: LDAP password disclosure in log files (CVE-2013-2006)
Product: Gentoo Security Reporter: Agostino Sarubbo <ago>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: RESOLVED FIXED    
Severity: trivial    
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
URL: https://bugzilla.redhat.com/show_bug.cgi?id=956007
Whiteboard: ~3 [noglsa]
Package list:
Runtime testing required: ---

Description Agostino Sarubbo gentoo-dev 2013-04-24 07:56:33 UTC
From ${URL} :

A security flaw was found in the way Openstack Keystone (previously) performed management of LDAP
password and admin_token Keystone daemon configuration file values. A local attacker could use this
flaw to obtain sensitive information.

Relevant upstream patch (Gerrit form):
[3] https://review.openstack.org/#/c/26826/

External references:
https://bugs.launchpad.net/ossn/+bug/1168252
http://openwall.com/lists/oss-security/2013/04/24/1

Different than CVE-2013-1977


@maintainer(s): after the bump, in case we need to stabilize the package, please say explicitly if it is ready for the stabilization or not
Comment 1 Matthew Thode ( prometheanfire ) archtester Gentoo Infrastructure gentoo-dev Security 2013-05-06 15:56:12 UTC
keystone 2013.1-r1 contains the fix, old badness out of tree
Comment 2 Sean Amoss (RETIRED) gentoo-dev Security 2013-05-10 16:07:11 UTC
(In reply to comment #1)
> keystone 2013.1-r1 contains the fix, old badness out of tree

Thanks, Matthew.

Closing noglsa for ~arch only.
Comment 3 GLSAMaker/CVETool Bot gentoo-dev 2013-08-29 03:15:50 UTC
CVE-2013-2006 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2006):
  OpenStack Identity (Keystone) Grizzly 2013.1.1, when DEBUG mode logging is
  enabled, logs the (1) admin_token and (2) LDAP password in plaintext, which
  allows local users to obtain sensitive by reading the log file.