From ${URL} : A security flaw was found in the way Openstack Keystone (previously) performed management of LDAP password and admin_token Keystone daemon configuration file values. A local attacker could use this flaw to obtain sensitive information. Relevant upstream patch (Gerrit form): [3] https://review.openstack.org/#/c/26826/ External references: https://bugs.launchpad.net/ossn/+bug/1168252 http://openwall.com/lists/oss-security/2013/04/24/1 Different than CVE-2013-1977 @maintainer(s): after the bump, in case we need to stabilize the package, please say explicitly if it is ready for the stabilization or not
keystone 2013.1-r1 contains the fix, old badness out of tree
(In reply to comment #1) > keystone 2013.1-r1 contains the fix, old badness out of tree Thanks, Matthew. Closing noglsa for ~arch only.
CVE-2013-2006 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2006): OpenStack Identity (Keystone) Grizzly 2013.1.1, when DEBUG mode logging is enabled, logs the (1) admin_token and (2) LDAP password in plaintext, which allows local users to obtain sensitive by reading the log file.