Bug 965852 (CVE-2013-2104)
Summary: | CVE-2013-2104 OpenStack Keystone: Missing expiration check in Keystone PKI token validation | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Product: | [Other] Security Response | Reporter: | Kurt Seifried <kseifried> | ||||||||||
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> | ||||||||||
Status: | CLOSED ERRATA | QA Contact: | |||||||||||
Severity: | medium | Docs Contact: | |||||||||||
Priority: | medium | ||||||||||||
Version: | unspecified | CC: | abaron, aortega, apevec, apevec, ayoung, bfilippov, breu, chrisw, dallan, d.busby, Jan.van.Eldik, jkt, jlieskov, jonathansteffan, jose.castro.leon, jrusnack, jruzicka, markmc, p, rbryant, rhos-maint, sclewis, security-response-team | ||||||||||
Target Milestone: | --- | Keywords: | Security | ||||||||||
Target Release: | --- | ||||||||||||
Hardware: | All | ||||||||||||
OS: | Linux | ||||||||||||
Whiteboard: | |||||||||||||
Fixed In Version: | Doc Type: | Bug Fix | |||||||||||
Doc Text: | Story Points: | --- | |||||||||||
Clone Of: | Environment: | ||||||||||||
Last Closed: | 2013-08-10 00:49:50 UTC | Type: | --- | ||||||||||
Regression: | --- | Mount Type: | --- | ||||||||||
Documentation: | --- | CRM: | |||||||||||
Verified Versions: | Category: | --- | |||||||||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||||||||
Cloudforms Team: | --- | Target Upstream Version: | |||||||||||
Embargoed: | |||||||||||||
Bug Depends On: | 965859, 965860, 968328, 968330, 970659, 970660 | ||||||||||||
Bug Blocks: | 965855 | ||||||||||||
Attachments: |
|
Description
Kurt Seifried
2013-05-21 20:49:54 UTC
Created attachment 751373 [details]
keystone-folsom-CVE-2013-2104.patch
Created attachment 751374 [details]
python-keystoneclient-master-CVE-2013-2104.patch
Created attachment 753617 [details]
Updated keystone-folsom-CVE-2013-2104.patch
Created attachment 754099 [details]
The final patch from upstream
The upstream patch is available here: https://github.com/openstack/keystone/commit/8d23da1302dde9d38bbc227d9aba30da919b60c8 And the upstream announcement is here: http://www.openwall.com/lists/oss-security/2013/05/28/7 This issue did NOT affect the version of the openstack-keystone package, as shipped with Fedora release of 17. -- This issue affects the version of the openstack-keystone package, as shipped with Fedora release of 18 and Fedora EPEL-6. Created openstack-keystone tracking bugs for this issue Affects: fedora-all [bug 968328] Affects: epel-6 [bug 968330] Created python-keystoneclient tracking bugs for this issue Affects: epel-6 [bug 970659] Affects: fedora-rawhide [bug 970660] Acknowledgements: This issue was discovered by Eoghan Glynn of Red Hat. This issue did NOT affect the versions of the python-keystoneclient package, as shipped with Fedora release of 17, 18, and Fedora EPEL-6. This issue has been addressed in following products: OpenStack 3 for RHEL 6 Via RHSA-2013:0944 https://rhn.redhat.com/errata/RHSA-2013-0944.html openstack-keystone-2012.2.4-5.el6 has been pushed to the Fedora EPEL 6 stable repository. If problems still persist, please make note of it in this bug report. openstack-keystone-2012.2.4-5.fc18 has been pushed to the Fedora 18 stable repository. If problems still persist, please make note of it in this bug report. python-keystoneclient-0.2.3-7.fc19 has been pushed to the Fedora 19 stable repository. If problems still persist, please make note of it in this bug report. |