Upstream information

CVE-2013-6391 at MITRE

Description

The ec2tokens API in OpenStack Identity (Keystone) before Havana 2013.2.1 and Icehouse before icehouse-2 does not return a trust-scoped token when one is received, which allows remote trust users to gain privileges by generating EC2 credentials from a trust-scoped token and using them in an ec2tokens API request.

SUSE information

Overall state of this security issue: Does not affect SUSE products

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 5.8
Vector AV:N/AC:M/Au:N/C:P/I:P/A:N
Access Vector Network
Access Complexity Medium
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact None
SUSE Bugzilla entry: 855338 [VERIFIED / FIXED]

No SUSE Security Announcements cross referenced.

List of released packages

Product(s) Fixed package version(s) References
SUSE OpenStack Cloud 6
  • openstack-keystone >= 8.0.2~a0~dev8-1.2
  • python-keystone >= 8.0.2~a0~dev8-1.2
Patchnames:
SUSE OpenStack Cloud 6 GA openstack-keystone-8.0.2~a0~dev34-1.4
SUSE OpenStack Cloud 6 GA openstack-keystone-8.0.2~a0~dev8-1.2


Status of this issue by product and package

Please note that this evaluation state might be work in progress, incomplete or outdated. Also information for service packs in the LTSS phase is only included for issues meeting the LTSS criteria. If in doubt, feel free to contact us for clarification.

Product(s) Source package State
HPE Helion OpenStack 8 openstack-keystone Analysis
SUSE OpenStack Cloud 7 openstack-keystone Unsupported
SUSE OpenStack Cloud 8 openstack-keystone Analysis
SUSE OpenStack Cloud 9 openstack-keystone Analysis
SUSE OpenStack Cloud Crowbar 8 openstack-keystone Analysis
SUSE OpenStack Cloud Crowbar 9 openstack-keystone Analysis