Bug 1082165 (CVE-2014-0105) - CVE-2014-0105 python-keystoneclient: Potential context confusion in Keystone middleware
Summary: CVE-2014-0105 python-keystoneclient: Potential context confusion in Keystone ...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2014-0105
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1082172 1082173 1083754 1083755 1087172 1087181
Blocks: 1082166
TreeView+ depends on / blocked
 
Reported: 2014-03-28 21:11 UTC by Vincent Danen
Modified: 2023-05-12 03:05 UTC (History)
26 users (show)

Fixed In Version: python-keystone-client 0.7.0
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2014-05-09 21:19:39 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
OpenStack gerrit 81078 0 None None None Never
Red Hat Product Errata RHSA-2014:0382 0 normal SHIPPED_LIVE Important: python-keystoneclient security update 2014-04-09 23:03:24 UTC
Red Hat Product Errata RHSA-2014:0409 0 normal SHIPPED_LIVE Important: python-keystoneclient security update 2014-04-17 05:41:42 UTC
Red Hat Product Errata RHSA-2014:0442 0 normal SHIPPED_LIVE Important: python-keystoneclient security update 2014-04-29 00:06:17 UTC

Description Vincent Danen 2014-03-28 21:11:47 UTC
Kieran Spear from the University of Melbourne reported [1] a vulnerability
in Keystone auth_token middleware (shipped in python-keystoneclient). By
doing repeated requests, with sufficient load on the target system, an
authenticated user may in certain situations assume another
authenticated user's complete identity and multi-tenant authorizations,
potentially resulting in a privilege escalation. Note that it is related
to a bad interaction between eventlet and python-memcached that should
be avoided if the calling process already monkey-patches "thread" to use
eventlet. Only keystone middleware setups using auth_token with memcache
are vulnerable.

python-keystoneclient fix (included in 0.7.0 release): https://review.openstack.org/81078

[1] https://bugs.launchpad.net/bugs/1282865


Acknowledgements:

Red Hat would like to thank the OpenStack project for reporting this issue. Upstream acknowledges Kieran Spear from the University of Melbourne as the original reporter.

Comment 1 Vincent Danen 2014-03-28 21:51:08 UTC
Created python-keystoneclient tracking bugs for this issue:

Affects: fedora-all [bug 1082172]
Affects: epel-6 [bug 1082173]

Comment 5 errata-xmlrpc 2014-04-09 17:31:01 UTC
This issue has been addressed in following products:

  OpenStack 4 for RHEL 6

Via RHSA-2014:0382 https://rhn.redhat.com/errata/RHSA-2014-0382.html

Comment 9 errata-xmlrpc 2014-04-17 01:42:01 UTC
This issue has been addressed in following products:

  Red Hat Storage 2.1

Via RHSA-2014:0409 https://rhn.redhat.com/errata/RHSA-2014-0409.html

Comment 10 errata-xmlrpc 2014-04-28 20:06:31 UTC
This issue has been addressed in following products:

  OpenStack 3 for RHEL 6

Via RHSA-2014:0442 https://rhn.redhat.com/errata/RHSA-2014-0442.html


Note You need to log in before you can comment on or make changes to this bug.