Keystone is a Python implementation of the OpenStack (http://www.openstack.org) identity service API. It was found that Keystone incorrectly handled authorization failures. If a client attempted to change their tenant membership to one they are not authorized to join, Keystone correctly returned a not authorized error; however, the client was still added to the tenant. Users able to access the Keystone administrative API could use this flaw to add any user to any tenant. (CVE-2012-3542) When logging into Keystone, the user receives a token to use for authentication with other services managed by Keystone. It was found that Keystone failed to revoke tokens if privileges were revoked, allowing users to retain access to resources they should no longer be able to access while their token remains valid. (CVE-2012-4413) It was found that the Keystone administrative API was missing authentication for certain actions. Users able to access the Keystone administrative API could use this flaw to add, start, and stop services, as well as list the roles for any user. (CVE-2012-4456) It was found that Keystone incorrectly handled disabled tenants. A user belonging to a disabled tenant could use this flaw to continue accessing resources as if the tenant were not disabled. (CVE-2012-4457) Red Hat would like to thank Dolph Mathews for reporting CVE-2012-3542 and CVE-2012-4413. All users of openstack-keystone are advised to upgrade to these updated packages, which upgrade openstack-keystone to upstream version 2012.1.2 and correct these issues. After installing the updated packages, the Keystone service (openstack-keystone) will be restarted automatically.
CPE | Name | Operator | Version |
---|---|---|---|
openstack-keystone | eq | 2012.1.1__1.el6 | |
openstack-keystone | eq | 2012.1.1__1.el6 |
secunia.com/advisories/50665
www.openwall.com/lists/oss-security/2012/09/28/5
www.securityfocus.com/bid/55716
access.redhat.com/errata/RHSA-2012:1378
access.redhat.com/security/cve/CVE-2012-4456
access.redhat.com/security/updates/classification/#important
bugs.launchpad.net/keystone/+bug/1006815
bugs.launchpad.net/keystone/+bug/1006822
bugzilla.redhat.com/show_bug.cgi?id=861179
exchange.xforce.ibmcloud.com/vulnerabilities/78944
github.com/openstack/keystone/commit/14b136aed9d988f5a8f3e699bd4577c9b874d6c1
github.com/openstack/keystone/commit/1d146f5c32e58a73a677d308370f147a3271c2cb
github.com/openstack/keystone/commit/24df3adb3f50cbb5ada411bc67aba8a781e6a431
github.com/openstack/keystone/commit/868054992faa45d6f42d822bf1588cb88d7c9ccb
lists.launchpad.net/openstack/msg17034.html
rhn.redhat.com/errata/RHSA-2012-1378.html