Bug 1962908 (CVE-2021-3563)
Summary: | CVE-2021-3563 Keystone: Verification of application credentials is silently length-limited | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Nick Tait <ntait> |
Component: | vulnerability | Assignee: | Nobody <nobody> |
Status: | NEW --- | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | dmendiza, dwilde, eglynn, jan.fedora, jjoyce, jschluet, lbragsta, lhh, lpeer, mburns, mgarciac, oblaut, sclewis, slinaber, spower, tuxmealux+redhatbz |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: |
A flaw was found in openstack-keystone. Only the first 72 characters of an application secret are verified allowing attackers bypass some password complexity which administrators may be counting on. The highest threat from this vulnerability is to data confidentiality and integrity.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | Type: | --- | |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1964525, 1964527, 1964529, 2070962, 2154112 | ||
Bug Blocks: | 1922882, 1963091 |
Description
Nick Tait
2021-05-20 18:41:05 UTC
Upstream report is https://bugs.launchpad.net/keystone/+bug/1901891 |