python-keystoneclient: CVE-2013-2166 CVE-2013-2167: Issues in Keystone middleware memcache signing/encryption feature

Related Vulnerabilities: CVE-2013-2166   CVE-2013-2167  

Debian Bug report logs - #713819
python-keystoneclient: CVE-2013-2166 CVE-2013-2167: Issues in Keystone middleware memcache signing/encryption feature

version graph

Reported by: Salvatore Bonaccorso <carnil@debian.org>

Date: Sat, 22 Jun 2013 20:54:02 UTC

Severity: grave

Tags: patch, security, upstream

Fixed in version python-keystoneclient/1:0.2.5-2

Done: Prach Pongpanich <prachpub@gmail.com>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, carnil@debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, PKG OpenStack <openstack-devel@lists.alioth.debian.org>:
Bug#713819; Package python-keystoneclient. (Sat, 22 Jun 2013 20:54:06 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
New Bug report received and forwarded. Copy sent to carnil@debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, PKG OpenStack <openstack-devel@lists.alioth.debian.org>. (Sat, 22 Jun 2013 20:54:06 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: python-keystoneclient: CVE-2013-2166 CVE-2013-2167: Issues in Keystone middleware memcache signing/encryption feature
Date: Sat, 22 Jun 2013 22:52:26 +0200
Package: python-keystoneclient
Severity: grave
Tags: security upstream patch

Hi,

the following vulnerabilities were published for python-keystoneclient.

CVE-2013-2166[0]:
middleware memcache encryption bypass

CVE-2013-2167[1]:
middleware memcache signing bypass

See [2] for further reference.

If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2166
    http://security-tracker.debian.org/tracker/CVE-2013-2166
[1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2167
    http://security-tracker.debian.org/tracker/CVE-2013-2167
[2] http://marc.info/?l=oss-security&m=137165644225629&w=2 

According to the advisory it should affect only upstream 0.2.3 to 0.2.5.
Could you please doublecheck this and adjust found version for the BTS?

Regards,
Salvatore 



Information forwarded to debian-bugs-dist@lists.debian.org, PKG OpenStack <openstack-devel@lists.alioth.debian.org>:
Bug#713819; Package python-keystoneclient. (Sun, 23 Jun 2013 05:03:04 GMT) (full text, mbox, link).


Acknowledgement sent to Prach Pongpanich <prachpub@gmail.com>:
Extra info received and forwarded to list. Copy sent to PKG OpenStack <openstack-devel@lists.alioth.debian.org>. (Sun, 23 Jun 2013 05:03:04 GMT) (full text, mbox, link).


Message #10 received at 713819@bugs.debian.org (full text, mbox, reply):

From: Prach Pongpanich <prachpub@gmail.com>
To: 713819@bugs.debian.org
Subject: Re: [Openstack-devel] Bug#713819: python-keystoneclient: CVE-2013-2166 CVE-2013-2167: Issues in Keystone middleware memcache signing/encryption feature
Date: Sun, 23 Jun 2013 12:01:22 +0700
On Sun, Jun 23, 2013 at 3:52 AM, Salvatore Bonaccorso <carnil@debian.org> wrote:
> Package: python-keystoneclient
> Severity: grave
> Tags: security upstream patch
>
> Hi,
>
> the following vulnerabilities were published for python-keystoneclient.
>
> CVE-2013-2166[0]:
> middleware memcache encryption bypass
>
> CVE-2013-2167[1]:
> middleware memcache signing bypass
>
> See [2] for further reference.
>
> If you fix the vulnerabilities please also make sure to include the
> CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.
>

Hi,

I've committed to fix this bug [1].

[1] http://anonscm.debian.org/gitweb/?p=openstack/python-keystoneclient.git

Regrads,
 Prach



Information forwarded to debian-bugs-dist@lists.debian.org, PKG OpenStack <openstack-devel@lists.alioth.debian.org>:
Bug#713819; Package python-keystoneclient. (Sun, 23 Jun 2013 12:51:10 GMT) (full text, mbox, link).


Acknowledgement sent to Thomas Goirand <zigo@debian.org>:
Extra info received and forwarded to list. Copy sent to PKG OpenStack <openstack-devel@lists.alioth.debian.org>. (Sun, 23 Jun 2013 12:51:10 GMT) (full text, mbox, link).


Message #15 received at 713819@bugs.debian.org (full text, mbox, reply):

From: Thomas Goirand <zigo@debian.org>
To: 713819@bugs.debian.org
Subject: Re: [Openstack-devel] Bug#713819: Bug#713819: python-keystoneclient: CVE-2013-2166 CVE-2013-2167: Issues in Keystone middleware memcache signing/encryption feature
Date: Sun, 23 Jun 2013 20:46:10 +0800
On 06/23/2013 01:01 PM, Prach Pongpanich wrote:
> On Sun, Jun 23, 2013 at 3:52 AM, Salvatore Bonaccorso <carnil@debian.org> wrote:
>> Package: python-keystoneclient
>> Severity: grave
>> Tags: security upstream patch
>>
>> Hi,
>>
>> the following vulnerabilities were published for python-keystoneclient.
>>
>> CVE-2013-2166[0]:
>> middleware memcache encryption bypass
>>
>> CVE-2013-2167[1]:
>> middleware memcache signing bypass
>>
>> See [2] for further reference.
>>
>> If you fix the vulnerabilities please also make sure to include the
>> CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.
>>
> 
> Hi,
> 
> I've committed to fix this bug [1].
> 
> [1] http://anonscm.debian.org/gitweb/?p=openstack/python-keystoneclient.git
> 
> Regrads,
>  Prach

Thanks. Uploaded.

Though I've noticed that some of the unit tests are failing after
applying the patch (3 failures). I don't know if that is expected or
not... though for what I'm doing, the client worked (keystone
service-list, keystone tenant-list, etc. worked)

Thomas



Reply sent to Prach Pongpanich <prachpub@gmail.com>:
You have taken responsibility. (Sun, 23 Jun 2013 12:51:25 GMT) (full text, mbox, link).


Notification sent to Salvatore Bonaccorso <carnil@debian.org>:
Bug acknowledged by developer. (Sun, 23 Jun 2013 12:51:25 GMT) (full text, mbox, link).


Message #20 received at 713819-close@bugs.debian.org (full text, mbox, reply):

From: Prach Pongpanich <prachpub@gmail.com>
To: 713819-close@bugs.debian.org
Subject: Bug#713819: fixed in python-keystoneclient 1:0.2.5-2
Date: Sun, 23 Jun 2013 12:48:06 +0000
Source: python-keystoneclient
Source-Version: 1:0.2.5-2

We believe that the bug you reported is fixed in the latest version of
python-keystoneclient, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 713819@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Prach Pongpanich <prachpub@gmail.com> (supplier of updated python-keystoneclient package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Sun, 23 Jun 2013 11:54:52 +0700
Source: python-keystoneclient
Binary: python-keystoneclient
Architecture: source all
Version: 1:0.2.5-2
Distribution: unstable
Urgency: low
Maintainer: PKG OpenStack <openstack-devel@lists.alioth.debian.org>
Changed-By: Prach Pongpanich <prachpub@gmail.com>
Description: 
 python-keystoneclient - client library for the OpenStack Keystone API
Closes: 713819
Changes: 
 python-keystoneclient (1:0.2.5-2) unstable; urgency=low
 .
   * Add Fix-memcache-encryption-middleware.patch (Closes: #713819)
     [OSSA 2013-017] Keystone middleware memcache signing/encryption feature
     (CVE-2013-2166 and CVE-2013-2167)
Checksums-Sha1: 
 44e85f0384f55a3e5b135cf8431982ddddad584c 1776 python-keystoneclient_0.2.5-2.dsc
 31c0d9c89fe78af037c7a3e77b659697b0646b66 36401 python-keystoneclient_0.2.5-2.debian.tar.gz
 7b04954ec92feb7a7ef5c199e956c4429426f54f 82292 python-keystoneclient_0.2.5-2_all.deb
Checksums-Sha256: 
 9542240a152d0d1cf88c89569adcfd63caa774ca4efc9da6da829ae9a66f20e4 1776 python-keystoneclient_0.2.5-2.dsc
 9ce930c74fa9fdf687533515f51a51c988e7bd1cdc25c457493bebc03cc693b0 36401 python-keystoneclient_0.2.5-2.debian.tar.gz
 77cd2f2665bd02f233048494a6d3f176ca3f3a2c2bcee6724c80948061fc9094 82292 python-keystoneclient_0.2.5-2_all.deb
Files: 
 3a28f1a6995d0e76dcbe844a50e9d80c 1776 python extra python-keystoneclient_0.2.5-2.dsc
 777a1a04ee0c694786b29c279b45089d 36401 python extra python-keystoneclient_0.2.5-2.debian.tar.gz
 36689855748341798e3f19557b3fd020 82292 python extra python-keystoneclient_0.2.5-2_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iEYEARECAAYFAlHG7pMACgkQl4M9yZjvmkmWKwCfQX/qqGtjizGBMgxRy/EoB2ji
rbYAn16mf0dDWv4X/A/VNJy5X8icON0o
=uGWG
-----END PGP SIGNATURE-----




Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Sun, 13 Oct 2013 07:27:34 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 15:41:29 2019; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.