Ubuntu 2061-1: OpenStack Keystone vulnerability

    Date19 Dec 2013
    CategoryUbuntu
    59
    Posted ByLinuxSecurity Advisories
    Keystone access controls could be circumvented via EC2-style tokens.
    
    ==========================================================================
    Ubuntu Security Notice USN-2061-1
    December 19, 2013
    
    keystone vulnerability
    ==========================================================================
    
    A security issue affects these releases of Ubuntu and its derivatives:
    
    - Ubuntu 13.10
    
    Summary:
    
    Keystone access controls could be circumvented via EC2-style tokens.
    
    Software Description:
    - keystone: OpenStack identity service
    
    Details:
    
    Steven Hardy discovered that Keystone did not properly enforce trusts when
    using the ec2tokens API. An authenticated attacker could exploit this to
    retrieve a token not scoped to the trust and elevate privileges to the
    trustor's roles.
    
    Update instructions:
    
    The problem can be corrected by updating your system to the following
    package versions:
    
    Ubuntu 13.10:
      python-keystone                 1:2013.2-0ubuntu1.2
    
    In general, a standard system update will make all the necessary changes.
    
    References:
      http://www.ubuntu.com/usn/usn-2061-1
      CVE-2013-6391
    
    Package Information:
      https://launchpad.net/ubuntu/+source/keystone/1:2013.2-0ubuntu1.2
    
    
    
    
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"25","type":"x","order":"1","pct":55.56,"resources":[]},{"id":"88","title":"Should be more technical","votes":"5","type":"x","order":"2","pct":11.11,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"15","type":"x","order":"3","pct":33.33,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.