Your submission was sent successfully! Close

CVE-2012-4413

Published: 13 September 2012

OpenStack Keystone 2012.1.3 does not invalidate existing tokens when granting or revoking roles, which allows remote authenticated users to retain the privileges of the revoked roles.

From the Ubuntu security team

Dolph Mathews discovered that when roles are granted and revoked to users in Keystone, pre-existing tokens were not updated or invalidated to take the new roles into account. An attacker could use this to continue to access resources that have been revoked.

Priority

Medium

Status

Package Release Status
keystone
Launchpad, Ubuntu, Debian
hardy Does not exist

lucid Does not exist

natty Does not exist

oneiric Ignored

precise
Released (2012.1+stable~20120824-a16a0ab9-0ubuntu2.2)
quantal Not vulnerable
(2012.2~rc1-0ubuntu1)
upstream
Released (2012.2~rc1)

Notes

AuthorNote
jdstrand
2012.2~rc1-0ubuntu1 on 12.10 includes the fixes
Keystone on 11.10 is a pre-release version and unusable with other
components such as nova and horizon

References

Bugs