Upstream information

CVE-2012-4413 at MITRE

Description

OpenStack Keystone 2012.1.3 does not invalidate existing tokens when granting or revoking roles, which allows remote authenticated users to retain the privileges of the revoked roles.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 4
Vector AV:N/AC:L/Au:S/C:N/I:P/A:N
Access Vector Network
Access Complexity Low
Authentication Single
Confidentiality Impact None
Integrity Impact Partial
Availability Impact None
SUSE Bugzilla entry: 779477 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE OpenStack Cloud 6
  • openstack-keystone >= 8.0.2~a0~dev8-1.2
  • python-keystone >= 8.0.2~a0~dev8-1.2
Patchnames:
SUSE OpenStack Cloud 6 GA openstack-keystone
SUSE Cloud 1.0
  • openstack-swift >= 1.4.8+git.1332408124.4a6fead-0.11.1
  • openstack-swift-account >= 1.4.8+git.1332408124.4a6fead-0.11.1
  • openstack-swift-container >= 1.4.8+git.1332408124.4a6fead-0.11.1
  • openstack-swift-doc >= 1.4.8+git.1332408124.4a6fead-0.11.1
  • openstack-swift-object >= 1.4.8+git.1332408124.4a6fead-0.11.1
  • openstack-swift-proxy >= 1.4.8+git.1332408124.4a6fead-0.11.1
  • python-swift >= 1.4.8+git.1332408124.4a6fead-0.11.1
Builds
SAT Patch Nr: 6819
SUSE Cloud 1.0
  • openstack-keystone >= 2012.1+git.1345702665.a16a0ab-0.7.1
  • openstack-keystone-doc >= 2012.1+git.1345702665.a16a0ab-0.7.1
  • python-keystone >= 2012.1+git.1345702665.a16a0ab-0.7.1
Builds
SAT Patch Nr: 6818