Bugzilla – Bug 839876
VUL-0: CVE-2013-4294: OSSA-2013-025: openstack-keystone: Token revocation failure using Keystone memcache/KVS backends
Last modified: 2014-01-31 16:07:00 UTC
Public via oss-security.
Date: Wed, 11 Sep 2013 17:44:25 +0200
From: Thierry Carrez
Subject: [oss-security] [OSSA 2013-025] Token revocation failure using Keystone memcache/KVS backends (CVE-2013-4294)
OpenStack Security Advisory: 2013-025
Date: September 11, 2013
Title: Token revocation failure using Keystone memcache/KVS backends
Reporter: Kieran Spear (University of Melbourne)
Affects: Folsom, Grizzly
Kieran Spear from the University of Melbourne reported a vulnerability
in Keystone memcache and KVS token backends. The PKI token revocation
lists stored the entire token instead of the token ID, triggering
comparison failures, ultimately resulting in revoked PKI tokens still
being considered valid. Only Folsom and Grizzly Keystone setups making
use of PKI tokens with the memcache or KVS token backends are affected.
Havana setups, setups using UUID tokens, or setups using PKI tokens with
the SQL token backend are all unaffected.
bugbot adjusting priority
Upstream fix is part of our openstack-keystone package currently in Devel:Cloud:2.0:Staging. Will be part of next update, thus closing.
The SWAMPID for this issue is 55533.
This issue was rated as moderate.
Please submit fixed packages until 2013-12-31.
When done, please reassign the bug to firstname.lastname@example.org.
Patchinfo will be handled by security team.
Update released for: openstack-keystone, openstack-keystone-doc, openstack-keystone-test, python-keystone
SUSE-CLOUD 2.0 (x86_64)
SUSE-SU-2014:0163-1: An update that solves two vulnerabilities and has two fixes is now available.
Category: security (moderate)
Bug References: 837800,839876,843443,848066
CVE References: CVE-2013-4222,CVE-2013-4477
SUSE Cloud 2.0 (src): openstack-keystone-2013.1.5.a2.g82dcde0-0.7.1, openstack-keystone-doc-2013.1.5.a2.g82dcde0-0.7.1