First published: Wed Sep 04 2013(Updated: )
The (1) mamcache and (2) KVS token backends in OpenStack Identity (Keystone) Folsom 2012.2.x and Grizzly before 2013.1.4 do not properly compare the PKI token revocation list with PKI tokens, which allow remote attackers to bypass intended access restrictions via a revoked PKI token.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenStack Keystone | =2012.2 | |
OpenStack Keystone | =2012.2.1 | |
OpenStack Keystone | =2012.2.2 | |
OpenStack Keystone | =2012.2.3 | |
OpenStack Keystone | =2012.2.4 | |
OpenStack Keystone | =2013.1 | |
OpenStack Keystone | =2013.1.1 | |
OpenStack Keystone | =2013.1.2 | |
OpenStack Keystone | =2013.1.3 | |
pip/keystone | >=2012.2.0<2013.1.4 | 2013.1.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.