User: Password:
|
|
Subscribe / Log in / New account

Ubuntu alert USN-2061-1 (keystone)

From:  Jamie Strandboge <jamie@canonical.com>
To:  ubuntu-security-announce@lists.ubuntu.com
Subject:  [USN-2061-1] OpenStack Keystone vulnerability
Date:  Thu, 19 Dec 2013 17:14:57 -0600
Message-ID:  <52B37DF1.6080605@canonical.com>

========================================================================== Ubuntu Security Notice USN-2061-1 December 19, 2013 keystone vulnerability ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 13.10 Summary: Keystone access controls could be circumvented via EC2-style tokens. Software Description: - keystone: OpenStack identity service Details: Steven Hardy discovered that Keystone did not properly enforce trusts when using the ec2tokens API. An authenticated attacker could exploit this to retrieve a token not scoped to the trust and elevate privileges to the trustor's roles. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 13.10: python-keystone 1:2013.2-0ubuntu1.2 In general, a standard system update will make all the necessary changes. References: http://www.ubuntu.com/usn/usn-2061-1 CVE-2013-6391 Package Information: https://launchpad.net/ubuntu/+source/keystone/1:2013.2-0u... -- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security...


(Log in to post comments)


Copyright © 2017, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds