keystone vulnerabilities

Related Vulnerabilities: CVE-2014-3476   CVE-2014-3520   CVE-2014-5251   CVE-2014-5252   CVE-2014-5253  

Several security issues were fixed in OpenStack Keystone.

Steven Hardy discovered that OpenStack Keystone did not properly handle chained delegation. A remove authenticated attacker could use this to gain privileges by creating a new token with additional roles. (CVE-2014-3476)

21 August 2014

keystone vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 14.04 LTS

Summary

Several security issues were fixed in OpenStack Keystone.

Software Description

  • keystone - OpenStack identity service

Details

Steven Hardy discovered that OpenStack Keystone did not properly handle chained delegation. A remove authenticated attacker could use this to gain privileges by creating a new token with additional roles. (CVE-2014-3476)

Jamie Lennox discovered that OpenStack Keystone did not properly validate the project id. A remote authenticated attacker may be able to use this to access other projects. (CVE-2014-3520)

Brant Knudson and Lance Bragstad discovered that OpenStack Keystone would not always revoke tokens correctly. If Keystone were configured to use revocation events, a remote authenticated attacker could continue to have access to resources. (CVE-2014-5251, CVE-2014-5252, CVE-2014-5253)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 14.04 LTS
python-keystone - 1:2014.1.2.1-0ubuntu1.1

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References