DescriptionOpenStack Keystone 10.x through 16.x before 16.0.2, 17.x before 17.0.1, 18.x before 18.0.1, and 19.x before 19.0.1 allows information disclosure during account locking (related to PCI DSS features). By guessing the name of an account and failing to authenticate multiple times, any unauthenticated actor could both confirm the account exists and obtain that account's corresponding UUID, which might be leveraged for other unrelated attacks. All deployments enabling security_compliance.lockout_failure_attempts are affected.
Overall state of this security issue: Pending
This issue is currently rated as having important severity.
|National Vulnerability Database|
|National Vulnerability Database||SUSE|
SUSE Security Advisories:
- SUSE-SU-2022:1654-1, published Thu May 12 19:20:22 UTC 2022
- SUSE-SU-2022:1729-1, published Wed May 18 19:16:04 UTC 2022
List of released packages
|Product(s)||Fixed package version(s)||References|
|HPE Helion Openstack 8|| ||Patchnames: |
|SUSE OpenStack Cloud 8|| ||Patchnames: |
|SUSE OpenStack Cloud 9|| ||Patchnames: |
|SUSE OpenStack Cloud Crowbar 8|| ||Patchnames: |
|SUSE OpenStack Cloud Crowbar 9|| ||Patchnames: |
Status of this issue by product and package
Please note that this evaluation state might be work in progress, incomplete or outdated. Also information for service packs in the LTSS phase is only included for issues meeting the LTSS criteria. If in doubt, feel free to contact us for clarification.
|HPE Helion OpenStack 8||openstack-keystone||Released|
|SUSE OpenStack Cloud 7||openstack-keystone||Unsupported|
|SUSE OpenStack Cloud 8||openstack-keystone||Released|
|SUSE OpenStack Cloud 9||openstack-keystone||Released|
|SUSE OpenStack Cloud Crowbar 8||openstack-keystone||Released|
|SUSE OpenStack Cloud Crowbar 9||openstack-keystone||Released|