Home
Reading
Searching
Subscribe
Sponsors
Statistics
Posting
Contact
Spam
Lists
Links
About
Hosting
Filtering
Features Download
Marketing
Archives
FAQ
Blog
 
Gmane
From: Jamie Strandboge <jamie <at> canonical.com>
Subject: [USN-1772-1] OpenStack Keystone vulnerability
Newsgroups: gmane.linux.ubuntu.security.announce
Date: Wednesday 20th March 2013 20:55:03 UTC (over 3 years ago)
==========================================================================
Ubuntu Security Notice USN-1772-1
March 20, 2013

keystone vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 12.10

Summary:

Under certain configurations, Keystone would allow unintended access over
the network.

Software Description:
- keystone: OpenStack identity service

Details:

Guang Yee discovered that Keystone would not always perform all
verification checks when configured to use PKI. If the keystone server was
configured to use PKI and services or users requested online verification,
an attacker could potentially exploit this to bypass revocation checks.
Keystone uses UUID tokens by default in Ubuntu.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.10:
  python-keystone                 2012.2.1-0ubuntu1.3

In general, a standard system update will make all the necessary changes.

References:
  http://www.ubuntu.com/usn/usn-1772-1
  CVE-2013-1865

Package Information:
  https://launchpad.net/ubuntu/+source/keystone/2012.2.1-0ubuntu1.3
 
CD: 3ms