==================================================================== OSSA-2015-008: Potential Keystone cache backend password leak in log ==================================================================== :Date: May 04, 2015 :CVE: CVE-2015-3646 Affects ~~~~~~~ - Keystone: versions through 2014.1.4, and 2014.2 versions through 2014.2.3 Description ~~~~~~~~~~~ Eric Brown from VMware reported a vulnerability in Keystone. The backend_argument configuration option content is being logged, and it may contain sensitive information for specific backends (like a password for MongoDB). An attacker with read access to Keystone logs may therefore obtain sensitive data about certain backends. All Keystone setups are potentially impacted. Patches ~~~~~~~ - https://review.openstack.org/175519 (Icehouse) - https://review.openstack.org/173116 (Juno) Credits ~~~~~~~ - Eric Brown from VMware (CVE-2015-3646) References ~~~~~~~~~~ - https://launchpad.net/bugs/1443598 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3646 Notes ~~~~~ - This fix will be included in future 2014.1.5 (icehouse) and 2014.2.4 (juno) releases. - The 2015.1.0 (kilo) release is not affected. -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 473 bytes Desc: OpenPGP digital signature URL: <http://lists.openstack.org/pipermail/openstack/attachments/20150505/5df1961b/attachment.sig>