Home
Reading
Searching
Subscribe
Sponsors
Statistics
Posting
Contact
Spam
Lists
Links
About
Hosting
Filtering
Features Download
Marketing
Archives
FAQ
Blog
 
Gmane
From: Jamie Strandboge <jamie <at> canonical.com>
Subject: [USN-2002-1] Keystone vulnerabilities
Newsgroups: gmane.linux.ubuntu.security.announce
Date: Wednesday 23rd October 2013 20:44:47 UTC (over 3 years ago)
==========================================================================
Ubuntu Security Notice USN-2002-1
October 23, 2013

keystone vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 13.04
- Ubuntu 12.10

Summary:

Keystone would improperly grant access to invalid tokens under certain
circumstances.

Software Description:
- keystone: OpenStack identity service

Details:

Chmouel Boudjnah discovered that Keystone did not properly invalidate user
tokens when a tenant was disabled which allowed an authenticated user to
retain access via the token. (CVE-2013-4222)

Kieran Spear discovered that Keystone did not properly verify PKI tokens
when performing revocation when using the memcache and KVS backends. An
authenticated attacker could exploit this to bypass intended access
restrictions. (CVE-2013-4294)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 13.04:
  python-keystone                 1:2013.1.3-0ubuntu1.1

Ubuntu 12.10:
  python-keystone                 2012.2.4-0ubuntu3.2

In general, a standard system update will make all the necessary changes.

References:
  http://www.ubuntu.com/usn/usn-2002-1
  CVE-2013-4222, CVE-2013-4294

Package Information:
  https://launchpad.net/ubuntu/+source/keystone/1:2013.1.3-0ubuntu1.1
  https://launchpad.net/ubuntu/+source/keystone/2012.2.4-0ubuntu3.2
 
CD: 4ms