Bug 953910 (CVE-2013-1977)

Summary: CVE-2013-1977 openstack-keystone: Insecure management of LDAP and admin_token configuration file values
Product: [Other] Security Response Reporter: Jan Lieskovsky <jlieskov>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED NOTABUG QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: apevec, apevec, bfilippov, breu, d.busby, Jan.van.Eldik, jonathansteffan, jose.castro.leon, markmc, p, rbryant
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2013-08-09 03:55:24 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 953921    

Description Jan Lieskovsky 2013-04-19 13:51:10 UTC
A security flaw was found in the way Openstack Keystone (previously) performed management of LDAP password and admin_token Keystone daemon configuration file values. A local attacker could use this flaw to obtain sensitive information.

References:
[1] https://bugs.launchpad.net/keystone/+bug/1168252
[2] http://www.openwall.com/lists/oss-security/2013/04/19/2

Relevant upstream patch (Gerrit form):
[3] https://review.openstack.org/#/c/26826/

Comment 2 Jan Lieskovsky 2013-04-24 07:46:16 UTC
Further CVE-2013-1977 vs CVE-2013-2006 ids disambiguation:
  https://bugs.launchpad.net/devstack/+bug/1168252/comments/7

Comment 3 Vincent Danen 2013-05-09 17:49:13 UTC
CVE-2013-1977 does not affect our installer, as it was hardened previously and has 0600 permissions, as noted on oss-sec:

http://seclists.org/oss-sec/2013/q2/126

Statement:

Not vulnerable.  This issue did not affect the version of openstack-keystone as shipped with Red Hat OpenStack Folsom.