=========================================================================Ubuntu Security Notice USN-1641-1
November 28, 2012

keystone vulnerabilities
=========================================================================
A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 12.10
- Ubuntu 12.04 LTS

Summary:

Keystone would allow unintended access to files over the network.

Software Description:
- keystone: OpenStack identity service

Details:

Vijaya Erukala discovered that Keystone did not properly invalidate
EC2-style credentials such that if credentials were removed from a tenant,
an authenticated and authorized user using those credentials may still be
allowed access beyond the account owner's expectations. (CVE-2012-5571)

It was discovered that Keystone did not properly implement token
expiration. A remote attacker could use this to continue to access an
account that is disabled or has a changed password. This issue was
previously fixed as CVE-2012-3426 but was reintroduced in Ubuntu 12.10.
(CVE-2012-5563)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.10:
  python-keystone                 2012.2-0ubuntu1.2

Ubuntu 12.04 LTS:
  python-keystone                 2012.1+stable~20120824-a16a0ab9-0ubuntu2.3

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-1641-1
  CVE-2012-5563, CVE-2012-5571

Package Information:
  https://launchpad.net/ubuntu/+source/keystone/2012.2-0ubuntu1.2

https://launchpad.net/ubuntu/+source/keystone/2012.1+stable~20120824-a16a0ab9-0ubuntu2.3




Ubuntu 1641-1: OpenStack Keystone vulnerabilities

November 28, 2012
Keystone would allow unintended access to files over the network.

Summary

Update Instructions

The problem can be corrected by updating your system to the following package versions: Ubuntu 12.10: python-keystone 2012.2-0ubuntu1.2 Ubuntu 12.04 LTS: python-keystone 2012.1+stable~20120824-a16a0ab9-0ubuntu2.3 In general, a standard system update will make all the necessary changes.

References

https://ubuntu.com/security/notices/USN-1641-1

CVE-2012-5563, CVE-2012-5571

Severity
=========================================================================Ubuntu Security Notice USN-1641-1

Package Information

https://launchpad.net/ubuntu/+source/keystone/2012.2-0ubuntu1.2 https://launchpad.net/ubuntu/+source/keystone/2012.1+stable~20120824-a16a0ab9-0ubuntu2.3

Related News