Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <5548B5F5.4060906@enovance.com>
Date: Tue, 05 May 2015 08:22:13 -0400
From: Tristan Cacqueray <tristan.cacqueray@...vance.com>
To: oss-security@...ts.openwall.com
Subject: [OSSA 2015-008] Potential Keystone cache backend password leak in
 log (CVE-2015-3646)

====================================================================
OSSA-2015-008: Potential Keystone cache backend password leak in log
====================================================================

:Date: May 04, 2015
:CVE: CVE-2015-3646


Affects
~~~~~~~
- Keystone: versions through 2014.1.4,
            and 2014.2 versions through 2014.2.3


Description
~~~~~~~~~~~
Eric Brown from VMware reported a vulnerability in Keystone. The
backend_argument configuration option content is being logged, and it
may contain sensitive information for specific backends (like a
password for MongoDB). An attacker with read access to Keystone logs
may therefore obtain sensitive data about certain backends. All
Keystone setups are potentially impacted.


Patches
~~~~~~~
- https://review.openstack.org/175519 (Icehouse)
- https://review.openstack.org/173116 (Juno)


Credits
~~~~~~~
- Eric Brown from VMware (CVE-2015-3646)


References
~~~~~~~~~~
- https://launchpad.net/bugs/1443598
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3646


Notes
~~~~~
- This fix will be included in future 2014.1.5 (icehouse) and 2014.2.4
  (juno) releases.
- The 2015.1.0 (kilo) release is not affected.


Download attachment "signature.asc" of type "application/pgp-signature" (474 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.