keystone vulnerabilities

Related Vulnerabilities: CVE-2012-5571   CVE-2012-3426   CVE-2012-5563  

Keystone would allow unintended access to files over the network.

Vijaya Erukala discovered that Keystone did not properly invalidate EC2-style credentials such that if credentials were removed from a tenant, an authenticated and authorized user using those credentials may still be allowed access beyond the account owner’s expectations. (CVE-2012-5571)

28 November 2012

keystone vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 12.10
  • Ubuntu 12.04 LTS

Summary

Keystone would allow unintended access to files over the network.

Software Description

  • keystone - OpenStack identity service

Details

Vijaya Erukala discovered that Keystone did not properly invalidate EC2-style credentials such that if credentials were removed from a tenant, an authenticated and authorized user using those credentials may still be allowed access beyond the account owner’s expectations. (CVE-2012-5571)

It was discovered that Keystone did not properly implement token expiration. A remote attacker could use this to continue to access an account that is disabled or has a changed password. This issue was previously fixed as CVE-2012-3426 but was reintroduced in Ubuntu 12.10. (CVE-2012-5563)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 12.10
python-keystone - 2012.2-0ubuntu1.2
Ubuntu 12.04 LTS
python-keystone - 2012.1+stable~20120824-a16a0ab9-0ubuntu2.3

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References