Upstream information

CVE-2021-38155 at MITRE

Description

OpenStack Keystone 10.x through 16.x before 16.0.2, 17.x before 17.0.1, 18.x before 18.0.1, and 19.x before 19.0.1 allows information disclosure during account locking (related to PCI DSS features). By guessing the name of an account and failing to authenticate multiple times, any unauthenticated actor could both confirm the account exists and obtain that account's corresponding UUID, which might be leveraged for other unrelated attacks. All deployments enabling security_compliance.lockout_failure_attempts are affected.

SUSE information

Overall state of this security issue: Analysis

This issue is currently rated as having low severity.

SUSE Bugzilla entry: 1189390 [NEW]

No SUSE Security Announcements cross referenced.


Status of this issue by product and package

Please note that this evaluation state might be work in progress, incomplete or outdated. Also information for service packs in the LTSS phase is only included for issues meeting the LTSS criteria. If in doubt, feel free to contact us for clarification.

Product(s) Source package State
HPE Helion OpenStack 8 openstack-keystone Affected
SUSE OpenStack Cloud 7 openstack-keystone Unsupported
SUSE OpenStack Cloud 8 openstack-keystone Affected
SUSE OpenStack Cloud 9 openstack-keystone Affected
SUSE OpenStack Cloud Crowbar 8 openstack-keystone Affected
SUSE OpenStack Cloud Crowbar 9 openstack-keystone Affected