From ${URL} : A security flaw was found in the way Openstack Keystone (previously) performed management of LDAP password and admin_token Keystone daemon configuration file values. A local attacker could use this flaw to obtain sensitive information. References: [1] https://bugs.launchpad.net/keystone/+bug/1168252 [2] http://www.openwall.com/lists/oss-security/2013/04/19/2 Relevant upstream patch (Gerrit form): [3] https://review.openstack.org/#/c/26826/
Patch has not been approved yet.
fix released for folsom and grizzly, offending ebuilds removed from tree. fixed in keystone-2012.2.4-r3.ebuild and keystone-2013.1.1.ebuild
CVE-2013-1977 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1977): OpenStack devstack uses world-readable permissions for keystone.conf, which allows local users to obtain sensitive information such as the LDAP password and admin_token secret by reading the file.
We're done here.