Bug 965852 (CVE-2013-2104)
| Summary: | CVE-2013-2104 OpenStack Keystone: Missing expiration check in Keystone PKI token validation | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | Kurt Seifried <kseifried> | ||||||||||
| Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> | ||||||||||
| Status: | CLOSED ERRATA | QA Contact: | |||||||||||
| Severity: | medium | Docs Contact: | |||||||||||
| Priority: | medium | ||||||||||||
| Version: | unspecified | CC: | abaron, aortega, apevec, apevec, ayoung, bfilippov, breu, chrisw, dallan, d.busby, Jan.van.Eldik, jkt, jlieskov, jonathansteffan, jose.castro.leon, jrusnack, jruzicka, markmc, p, rbryant, rhos-maint, sclewis, security-response-team | ||||||||||
| Target Milestone: | --- | Keywords: | Security | ||||||||||
| Target Release: | --- | ||||||||||||
| Hardware: | All | ||||||||||||
| OS: | Linux | ||||||||||||
| Whiteboard: | |||||||||||||
| Fixed In Version: | Doc Type: | Bug Fix | |||||||||||
| Doc Text: | Story Points: | --- | |||||||||||
| Clone Of: | Environment: | ||||||||||||
| Last Closed: | 2013-08-10 00:49:50 UTC | Type: | --- | ||||||||||
| Regression: | --- | Mount Type: | --- | ||||||||||
| Documentation: | --- | CRM: | |||||||||||
| Verified Versions: | Category: | --- | |||||||||||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||||||||
| Cloudforms Team: | --- | Target Upstream Version: | |||||||||||
| Embargoed: | |||||||||||||
| Bug Depends On: | 965859, 965860, 968328, 968330, 970659, 970660 | ||||||||||||
| Bug Blocks: | 965855 | ||||||||||||
| Attachments: |
|
||||||||||||
|
Description
Kurt Seifried
2013-05-21 20:49:54 UTC
Created attachment 751373 [details]
keystone-folsom-CVE-2013-2104.patch
Created attachment 751374 [details]
python-keystoneclient-master-CVE-2013-2104.patch
Created attachment 753617 [details]
Updated keystone-folsom-CVE-2013-2104.patch
Created attachment 754099 [details]
The final patch from upstream
The upstream patch is available here: https://github.com/openstack/keystone/commit/8d23da1302dde9d38bbc227d9aba30da919b60c8 And the upstream announcement is here: http://www.openwall.com/lists/oss-security/2013/05/28/7 This issue did NOT affect the version of the openstack-keystone package, as shipped with Fedora release of 17. -- This issue affects the version of the openstack-keystone package, as shipped with Fedora release of 18 and Fedora EPEL-6. Created openstack-keystone tracking bugs for this issue Affects: fedora-all [bug 968328] Affects: epel-6 [bug 968330] Created python-keystoneclient tracking bugs for this issue Affects: epel-6 [bug 970659] Affects: fedora-rawhide [bug 970660] Acknowledgements: This issue was discovered by Eoghan Glynn of Red Hat. This issue did NOT affect the versions of the python-keystoneclient package, as shipped with Fedora release of 17, 18, and Fedora EPEL-6. This issue has been addressed in following products: OpenStack 3 for RHEL 6 Via RHSA-2013:0944 https://rhn.redhat.com/errata/RHSA-2013-0944.html openstack-keystone-2012.2.4-5.el6 has been pushed to the Fedora EPEL 6 stable repository. If problems still persist, please make note of it in this bug report. openstack-keystone-2012.2.4-5.fc18 has been pushed to the Fedora 18 stable repository. If problems still persist, please make note of it in this bug report. python-keystoneclient-0.2.3-7.fc19 has been pushed to the Fedora 19 stable repository. If problems still persist, please make note of it in this bug report. |