Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1082165 - (CVE-2014-0105) CVE-2014-0105 python-keystoneclient: Potential context confusion in Keystone middleware
CVE-2014-0105 python-keystoneclient: Potential context confusion in Keystone ...
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
high Severity high
: ---
: ---
Assigned To: Red Hat Product Security
impact=important,public=20140327,repo...
: Security
Depends On: 1082172 1082173 1083754 1083755 1087172 1087181
Blocks: 1082166
  Show dependency treegraph
 
Reported: 2014-03-28 17:11 EDT by Vincent Danen
Modified: 2016-04-26 10:25 EDT (History)
26 users (show)

See Also:
Fixed In Version: python-keystone-client 0.7.0
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2014-05-09 17:19:39 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
OpenStack gerrit 81078 None None None Never
Red Hat Product Errata RHSA-2014:0382 normal SHIPPED_LIVE Important: python-keystoneclient security update 2014-04-09 19:03:24 EDT
Red Hat Product Errata RHSA-2014:0409 normal SHIPPED_LIVE Important: python-keystoneclient security update 2014-04-17 01:41:42 EDT
Red Hat Product Errata RHSA-2014:0442 normal SHIPPED_LIVE Important: python-keystoneclient security update 2014-04-28 20:06:17 EDT

  None (edit)
Description Vincent Danen 2014-03-28 17:11:47 EDT
Kieran Spear from the University of Melbourne reported [1] a vulnerability
in Keystone auth_token middleware (shipped in python-keystoneclient). By
doing repeated requests, with sufficient load on the target system, an
authenticated user may in certain situations assume another
authenticated user's complete identity and multi-tenant authorizations,
potentially resulting in a privilege escalation. Note that it is related
to a bad interaction between eventlet and python-memcached that should
be avoided if the calling process already monkey-patches "thread" to use
eventlet. Only keystone middleware setups using auth_token with memcache
are vulnerable.

python-keystoneclient fix (included in 0.7.0 release): https://review.openstack.org/81078

[1] https://bugs.launchpad.net/bugs/1282865


Acknowledgements:

Red Hat would like to thank the OpenStack project for reporting this issue. Upstream acknowledges Kieran Spear from the University of Melbourne as the original reporter.
Comment 1 Vincent Danen 2014-03-28 17:51:08 EDT
Created python-keystoneclient tracking bugs for this issue:

Affects: fedora-all [bug 1082172]
Affects: epel-6 [bug 1082173]
Comment 5 errata-xmlrpc 2014-04-09 13:31:01 EDT
This issue has been addressed in following products:

  OpenStack 4 for RHEL 6

Via RHSA-2014:0382 https://rhn.redhat.com/errata/RHSA-2014-0382.html
Comment 9 errata-xmlrpc 2014-04-16 21:42:01 EDT
This issue has been addressed in following products:

  Red Hat Storage 2.1

Via RHSA-2014:0409 https://rhn.redhat.com/errata/RHSA-2014-0409.html
Comment 10 errata-xmlrpc 2014-04-28 16:06:31 EDT
This issue has been addressed in following products:

  OpenStack 3 for RHEL 6

Via RHSA-2014:0442 https://rhn.redhat.com/errata/RHSA-2014-0442.html

Note You need to log in before you can comment on or make changes to this bug.