Upstream information

CVE-2012-5571 at MITRE

Description

OpenStack Keystone Essex (2012.1) and Folsom (2012.2) does not properly handle EC2 tokens when the user role has been removed from a tenant, which allows remote authenticated users to bypass intended authorization restrictions by leveraging a token for the removed user role.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 3.5
Vector AV:N/AC:M/Au:S/C:N/I:P/A:N
Access Vector Network
Access Complexity Medium
Authentication Single
Confidentiality Impact None
Integrity Impact Partial
Availability Impact None
SUSE Bugzilla entry: 791203 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE Cloud 1.0
  • openstack-keystone >= 2012.1+git.1353613280.c17a999-0.5.1
  • openstack-keystone-doc >= 2012.1+git.1353613280.c17a999-0.5.1
  • python-keystone >= 2012.1+git.1353613280.c17a999-0.5.1
Builds
SAT Patch Nr: 7107