USN-1552-1: OpenStack Keystone vulnerabilities
Publication date
3 September 2012
Overview
Two security issues were fixed in OpenStack Keystone.
Releases
Packages
- keystone - OpenStack identity service
Details
Dolph Mathews discovered that OpenStack Keystone did not properly
restrict to administrative users the ability to update users’
tenants. A remote attacker that can reach the administrative API can
use this to add any user to any tenant. (CVE-2012-3542)
Derek Higgins discovered that OpenStack Keystone did not properly
implement token expiration. A remote attacker could use this to
continue to access an account that has been disabled or has a changed
password. (CVE-2012-3426)
Dolph Mathews discovered that OpenStack Keystone did not properly
restrict to administrative users the ability to update users’
tenants. A remote attacker that can reach the administrative API can
use this to add any user to any tenant. (CVE-2012-3542)
Derek Higgins discovered that OpenStack Keystone did not properly
implement token expiration. A remote attacker could use this to
continue to access an account that has been disabled or has a changed
password. (CVE-2012-3426)
Update instructions
In general, a standard system update will make all the necessary changes.
Learn more about how to get the fixes.The problem can be corrected by updating your system to the following package versions:
Ubuntu Release | Package Version | ||
---|---|---|---|
12.04 precise | keystone – 2012.1+stable~20120824-a16a0ab9-0ubuntu2.1 | ||
python-keystone – 2012.1+stable~20120824-a16a0ab9-0ubuntu2.1 |
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.