Vijaya Erukala discovered that Keystone did not properly invalidate
EC2-style credentials such that if credentials were removed from a tenant,
an authenticated and authorized user using those credentials may still be
allowed access beyond the account owner’s expectations. (CVE-2012-5571)
It was discovered that Keystone did not properly implement token
expiration. A remote attacker could use this to continue to access an
account that is disabled or has a changed password. This issue was
previously fixed as CVE-2012-3426 but was reintroduced in Ubuntu 12.10.
(CVE-2012-5563)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 12.10 | noarch | python-keystone | < 2012.2-0ubuntu1.2 | UNKNOWN |
Ubuntu | 12.10 | noarch | keystone | < 2012.2-0ubuntu1.2 | UNKNOWN |
Ubuntu | 12.10 | noarch | keystone-doc | < 2012.2-0ubuntu1.2 | UNKNOWN |
Ubuntu | 12.04 | noarch | python-keystone | < 2012.1+stable~20120824-a16a0ab9-0ubuntu2.3 | UNKNOWN |
Ubuntu | 12.04 | noarch | keystone | < 2012.1+stable~20120824-a16a0ab9-0ubuntu2.3 | UNKNOWN |
Ubuntu | 12.04 | noarch | keystone-doc | < 2012.1+stable~20120824-a16a0ab9-0ubuntu2.3 | UNKNOWN |