keystone: CVE-2013-2157 - authentication bypass when using LDAP backend

Related Vulnerabilities: CVE-2013-2157  

Debian Bug report logs - #712160
keystone: CVE-2013-2157 - authentication bypass when using LDAP backend

version graph

Reported by: Yves-Alexis Perez <corsac@debian.org>

Date: Thu, 13 Jun 2013 16:33:01 UTC

Severity: grave

Tags: security

Fixed in version keystone/2013.1.2-1

Done: Salvatore Bonaccorso <carnil@debian.org>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, PKG OpenStack <openstack-devel@lists.alioth.debian.org>:
Bug#712160; Package keystone. (Thu, 13 Jun 2013 16:33:06 GMT) (full text, mbox, link).


Acknowledgement sent to Yves-Alexis Perez <corsac@debian.org>:
New Bug report received and forwarded. Copy sent to team@security.debian.org, secure-testing-team@lists.alioth.debian.org, PKG OpenStack <openstack-devel@lists.alioth.debian.org>. (Thu, 13 Jun 2013 16:33:06 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Yves-Alexis Perez <corsac@debian.org>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: keystone: CVE-2013-2157 - authentication bypass when using LDAP backend
Date: Thu, 13 Jun 2013 18:29:09 +0200
Package: keystone
Severity: grave
Tags: security
Justification: user security hole

Hi,

a vulnerability was recently reported against keystone. See
http://article.gmane.org/gmane.comp.security.oss.general/10412 for the
detailed mail.

Please include the CVE number in the changelog entry when uploading, and
please contact the security team for uploads targetting stable/oldstable
if needed.

Regards,
-- 
Yves-Alexis

-- System Information:
Debian Release: jessie/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing'), (500, 'stable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 3.9-1-grsec-amd64 (SMP w/4 CPU cores)
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash



Information forwarded to debian-bugs-dist@lists.debian.org, PKG OpenStack <openstack-devel@lists.alioth.debian.org>:
Bug#712160; Package keystone. (Thu, 13 Jun 2013 17:30:07 GMT) (full text, mbox, link).


Acknowledgement sent to Prach Pongpanich <prachpub@gmail.com>:
Extra info received and forwarded to list. Copy sent to PKG OpenStack <openstack-devel@lists.alioth.debian.org>. (Thu, 13 Jun 2013 17:30:07 GMT) (full text, mbox, link).


Message #10 received at 712160@bugs.debian.org (full text, mbox, reply):

From: Prach Pongpanich <prachpub@gmail.com>
To: 712160@bugs.debian.org
Subject: Re: [Openstack-devel] Bug#712160: keystone: CVE-2013-2157 - authentication bypass when using LDAP backend
Date: Fri, 14 Jun 2013 00:27:26 +0700
[Message part 1 (text/plain, inline)]
On Thu, Jun 13, 2013 at 11:29 PM, Yves-Alexis Perez <corsac@debian.org> wrote:
> Package: keystone
> Severity: grave
> Tags: security
> Justification: user security hole
>
> Hi,
>
> a vulnerability was recently reported against keystone. See
> http://article.gmane.org/gmane.comp.security.oss.general/10412 for the
> detailed mail.
>
> Please include the CVE number in the changelog entry when uploading, and
> please contact the security team for uploads targetting stable/oldstable
> if needed.
>
> Regards,

Thanks Yves-Alexis!

I'm attaching the patches for both the Wheezy and Unstable versions
of Keystone (Folsom and Grizzly, respectively).

Regrads,
 Prach
[CVE-2013-2157_folsom_Authentication_bypass_when_using_LDAP_backend.patch (application/octet-stream, attachment)]
[CVE-2013-2157_grizzly_Authentication_bypass_when_using_LDAP_backend.patch (application/octet-stream, attachment)]

Reply sent to Salvatore Bonaccorso <carnil@debian.org>:
You have taken responsibility. (Sun, 16 Jun 2013 18:24:05 GMT) (full text, mbox, link).


Notification sent to Yves-Alexis Perez <corsac@debian.org>:
Bug acknowledged by developer. (Sun, 16 Jun 2013 18:24:05 GMT) (full text, mbox, link).


Message #15 received at 712160-done@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: 712160-done@bugs.debian.org, Thomas Goirand <zigo@debian.org>
Cc: Yves-Alexis Perez <corsac@debian.org>
Subject: Re: Bug#712160: keystone: CVE-2013-2157 - authentication bypass when using LDAP backend
Date: Sun, 16 Jun 2013 20:20:42 +0200
Source: keystone
Source-Version: 2013.1.2-1

Hi Thomas

On Thu, Jun 13, 2013 at 06:29:09PM +0200, Yves-Alexis Perez wrote:
> Package: keystone
> Severity: grave
> Tags: security
> Justification: user security hole
> 
> Hi,
> 
> a vulnerability was recently reported against keystone. See
> http://article.gmane.org/gmane.comp.security.oss.general/10412 for the
> detailed mail.
> 
> Please include the CVE number in the changelog entry when uploading, and
> please contact the security team for uploads targetting stable/oldstable
> if needed.

Looks like the patch was applied to 2013.1.2-1 but this bug not
closed. Doing so manually now.

Regards,
Salvatore



Message #16 received at 712160-done@bugs.debian.org (full text, mbox, reply):

From: Thomas Goirand <zigo@debian.org>
To: Salvatore Bonaccorso <carnil@debian.org>
Cc: 712160-done@bugs.debian.org, Yves-Alexis Perez <corsac@debian.org>
Subject: Re: Bug#712160: keystone: CVE-2013-2157 - authentication bypass when using LDAP backend
Date: Mon, 17 Jun 2013 02:28:41 +0800
On 06/17/2013 02:20 AM, Salvatore Bonaccorso wrote:
> Source: keystone
> Source-Version: 2013.1.2-1
> 
> Hi Thomas
> 
> On Thu, Jun 13, 2013 at 06:29:09PM +0200, Yves-Alexis Perez wrote:
>> Package: keystone
>> Severity: grave
>> Tags: security
>> Justification: user security hole
>>
>> Hi,
>>
>> a vulnerability was recently reported against keystone. See
>> http://article.gmane.org/gmane.comp.security.oss.general/10412 for the
>> detailed mail.
>>
>> Please include the CVE number in the changelog entry when uploading, and
>> please contact the security team for uploads targetting stable/oldstable
>> if needed.
> 
> Looks like the patch was applied to 2013.1.2-1 but this bug not
> closed. Doing so manually now.
> 
> Regards,
> Salvatore
> 

That's correct, thanks for doing so!

Thomas



Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Sun, 26 Apr 2015 07:45:27 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 13:10:16 2019; Machine Name: beach

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.