Ubuntu 2034-1: OpenStack Keystone vulnerability

    Date 25 Nov 2013
    101
    Posted By LinuxSecurity Advisories
    Keystone would improperly remove roles when it was configured to use the LDAP backend.
    
    ==========================================================================
    Ubuntu Security Notice USN-2034-1
    November 25, 2013
    
    keystone vulnerability
    ==========================================================================
    
    A security issue affects these releases of Ubuntu and its derivatives:
    
    - Ubuntu 13.10
    - Ubuntu 13.04
    - Ubuntu 12.10
    
    Summary:
    
    Keystone would improperly remove roles when it was configured to use the
    LDAP backend.
    
    Software Description:
    - keystone: OpenStack identity service
    
    Details:
    
    Brant Knudson discovered a logic error in the LDAP backend in Keystone
    where removing a role on a tenant for a user who does not have that role
    would instead add the role to the user. An authenticated user could use
    this to gain privileges. Ubuntu is not configured to use the LDAP Keystone
    backend by default.
    
    Update instructions:
    
    The problem can be corrected by updating your system to the following
    package versions:
    
    Ubuntu 13.10:
      python-keystone                 1:2013.2-0ubuntu1.1
    
    Ubuntu 13.04:
      python-keystone                 1:2013.1.4-0ubuntu1.1
    
    Ubuntu 12.10:
      python-keystone                 2012.2.4-0ubuntu3.3
    
    In general, a standard system update will make all the necessary changes.
    
    References:
      https://www.ubuntu.com/usn/usn-2034-1
      CVE-2013-4477
    
    Package Information:
      https://launchpad.net/ubuntu/+source/keystone/1:2013.2-0ubuntu1.1
      https://launchpad.net/ubuntu/+source/keystone/1:2013.1.4-0ubuntu1.1
      https://launchpad.net/ubuntu/+source/keystone/2012.2.4-0ubuntu3.3
    
    
    
    
    

    LinuxSecurity Poll

    If you are using full-disk encryption: are you concerned about the resulting performance hit?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    /main-polls/34-if-you-are-using-full-disk-encryption-are-you-concerned-about-the-resulting-performance-hit?task=poll.vote&format=json
    34
    radio
    [{"id":"120","title":"Yes","votes":"13","type":"x","order":"1","pct":59.09,"resources":[]},{"id":"121","title":"No ","votes":"9","type":"x","order":"2","pct":40.91,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350
    bottom 200

    Advisories

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.