Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 467054 (CVE-2013-2006) - <sys-auth/keystone-2013.1-r1: LDAP password disclosure in log files (CVE-2013-2006)
Summary: <sys-auth/keystone-2013.1-r1: LDAP password disclosure in log files (CVE-2013...
Alias: CVE-2013-2006
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal trivial (vote)
Assignee: Gentoo Security
Whiteboard: ~3 [noglsa]
Depends on:
Reported: 2013-04-24 07:56 UTC by Agostino Sarubbo
Modified: 2013-08-29 03:15 UTC (History)
0 users

See Also:
Package list:
Runtime testing required: ---


Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2013-04-24 07:56:33 UTC
From ${URL} :

A security flaw was found in the way Openstack Keystone (previously) performed management of LDAP
password and admin_token Keystone daemon configuration file values. A local attacker could use this
flaw to obtain sensitive information.

Relevant upstream patch (Gerrit form):

External references:

Different than CVE-2013-1977

@maintainer(s): after the bump, in case we need to stabilize the package, please say explicitly if it is ready for the stabilization or not
Comment 1 Matthew Thode ( prometheanfire ) archtester Gentoo Infrastructure gentoo-dev Security 2013-05-06 15:56:12 UTC
keystone 2013.1-r1 contains the fix, old badness out of tree
Comment 2 Sean Amoss (RETIRED) gentoo-dev Security 2013-05-10 16:07:11 UTC
(In reply to comment #1)
> keystone 2013.1-r1 contains the fix, old badness out of tree

Thanks, Matthew.

Closing noglsa for ~arch only.
Comment 3 GLSAMaker/CVETool Bot gentoo-dev 2013-08-29 03:15:50 UTC
CVE-2013-2006 (
  OpenStack Identity (Keystone) Grizzly 2013.1.1, when DEBUG mode logging is
  enabled, logs the (1) admin_token and (2) LDAP password in plaintext, which
  allows local users to obtain sensitive by reading the log file.