[Openstack] [OSSA 2014-006] Trustee token revocation does not work with memcache backend (CVE-2014-2237)

Tristan Cacqueray tristan.cacqueray at enovance.com
Tue Mar 4 16:26:08 UTC 2014


OpenStack Security Advisory: 2014-006
CVE: CVE-2014-2237
Date: March 04, 2014
Title: Trustee token revocation does not work with memcache backend
Reporter: Morgan Fainberg (Metacloud)
Products: Keystone
Versions: 2013.1 up to 2013.1.4 and 2013.2 versions up to 2013.2.2

Description:
Morgan Fainberg from Metacloud reported a vulnerability in the Keystone
memcache token backend. When a trustor issues a trust token with
impersonation enabled, the token is only added to the trustor's token
list and not to the trustee's token list. This results in the trust
token not being invalidated by the trustee's token revocation (bulk
revocation). This is most noticeable when the trustee user is disabled
or the trustee changes a password. Only setups using the memcache
backend for tokens in Keystone are affected.

Icehouse (development branch) fix:
https://review.openstack.org/60743

Havana fix:
https://review.openstack.org/75521

Grizzly fix:
https://review.openstack.org/75526

Notes:
This fix will be included in the icehouse-3 development milestone and in
future 2013.1.5 and 2013.2.3 releases.

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2237
https://launchpad.net/bugs/1260080

--
Tristan Cacqueray
OpenStack Vulnerability Management Team

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 555 bytes
Desc: OpenPGP digital signature
URL: <http://lists.openstack.org/pipermail/openstack/attachments/20140304/c14e3c33/attachment.sig>


More information about the Openstack mailing list