Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 458334 - <sys-auth/keystone-2012.2.3-r1: multiple vulnerabilities (CVE-2013-{0282,1664,1665})
Summary: <sys-auth/keystone-2012.2.3-r1: multiple vulnerabilities (CVE-2013-{0282,1664...
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal trivial (vote)
Assignee: Gentoo Security
URL: http://www.openwall.com/lists/oss-sec...
Whiteboard: ~3 [noglsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2013-02-19 17:56 UTC by Agostino Sarubbo
Modified: 2013-02-23 22:01 UTC (History)
0 users

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2013-02-19 17:56:20 UTC
From ${URL} :

Description:
Jonathan Murray from NCC Group, Joshua Harlow from Yahoo! and Stuart
Stent independently reported a vulnerabilities in the parsing of XML
requests in Python XML libraries used in Keystone, Nova and Cinder. By
using entities in XML requests, an unauthenticated attacker may consume
excessive resources on the Keystone, Nova or Cinder API servers,
resulting in a denial of service and potentially a crash
(CVE-2013-1664). Authenticated attackers may also leverage XML entities
to read the content of a local file on the Keystone API server
(CVE-2013-1665). This only affects servers with XML support enabled.

Note:
The vulnerabilities are actually in the various affected Python XML
libraries, but we provide OpenStack patches working around the issues.

Grizzly (development branch) fixes:
Nova: https://review.openstack.org/#/c/22309/
Cinder: https://review.openstack.org/#/c/22310/
Keystone: https://review.openstack.org/#/c/22315/

Folsom fixes:
Nova: https://review.openstack.org/#/c/22312/
Cinder: https://review.openstack.org/#/c/22311/
Keystone: https://review.openstack.org/#/c/22314/

Essex fixes:
Nova: https://review.openstack.org/#/c/22313/
Keystone: https://review.openstack.org/#/c/22316/

References:
https://bugs.launchpad.net/nova/+bug/1100282
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2013-1664
https://bugs.launchpad.net/keystone/+bug/1100279
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2013-1665
Comment 1 Agostino Sarubbo gentoo-dev 2013-02-19 17:56:49 UTC
and from http://www.openwall.com/lists/oss-security/2013/02/19/3 :

OpenStack Security Advisory: 2013-005
CVE: CVE-2013-0282
Date: February 19, 2013
Keystone EC2-style authentication accepts disabled user/tenants
Reporter: Nathanael Burton (National Security Agency)
Products: Keystone
Affects: All versions

Description:
Nathanael Burton reported a vulnerability in EC2-style authentication in
Keystone. Keystone fails to check whether a user, tenant, or domain is
enabled before authenticating a user using the EC2 api. Authenticated,
but disabled users (or authenticated users in disabled tenants or
domains) could therefore retain access rights that were thought removed.
Only setups enabling EC2-style authentication are affected. To disable
EC2-style authentication to work around the issue, remove the EC2
extension (keystone.contrib.ec2:Ec2Extension.factory) from the keystone
API pipeline in keystone.conf.

Grizzly (development branch) fix:
https://review.openstack.org/#/c/22319/

Folsom fix:
https://review.openstack.org/#/c/22320/

Essex fix:
https://review.openstack.org/#/c/22321/

References:
https://bugs.launchpad.net/keystone/+bug/1121494
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2013-0282
Comment 2 Matthew Thode ( prometheanfire ) archtester Gentoo Infrastructure gentoo-dev Security 2013-02-20 06:20:09 UTC
Updated keystone to keystone-2012.2.3-r1.ebuild with all the CVE patches... (three so far this month I think).

also, 9999 should be good, git master and all
Comment 3 Sean Amoss (RETIRED) gentoo-dev Security 2013-02-23 21:55:42 UTC
Thanks, Matthew.

Closing noglsa for ~arch only.