Wednesday, February 20, 2013

[USN-1730-1] OpenStack Keystone vulnerabilities

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with undefined - http://www.enigmail.net/

iQIcBAEBCgAGBQJRJWcyAAoJEFHb3FjMVZVz5LQQAIc7S1501UMKGAPNXdXXl/pF
hfWqQxXeXlH2vtR5iOXt11ZKD+oVZODBHMElKRR/IxWvUJT04VNrtL0tVCwtOvan
ohW+uYQlbnjbW4KbepT5vsT2KL8MxBUnn1oj9l/w0FfVKO+hJi0++K9Et/NVI8ic
XVts1TFBD/qhrO5U5fZ5Dl/NjFS395oVn++2JjLvd2evYg7z582C20QFdkS8TF5E
ajsG2x29mm56Xd6v6yHQh8bAOx+WTyEuM69SZQul/GIDWEtbl3Vh0BTx3+4QoATv
fDvsUfZHGY4l9384PoOxM1cnwSrKbb7eGIKVS0Xr6wZikofQ32XJkgX7raatHZqS
lUwfUGVOdFBe/sJoTUHdK62LXMRDnlpMCgG65QOaj0Rsv1SvpqfQZp7frfEOWUw8
cW/y/TPfWL5lmdRCIdAHsyOI9TCE3Xy2Xezx5BsS3dkYHBjrE9D5lvNbBt7+6OKO
/0xKmn/NJ+HpXgNc0HCMDle9N6ViNHqOIkaVP4nDpJ44/XCKuU4m3caQbPkA1YFx
1BbSO7Yzrze1Olb+mHBm2vBD23q6e9zaiL2KnVrLMgcQaefu4yvCEcs+doP6p/Wg
JVg+uGLYNmZgYLBPNgge1RO8eyOn5LEa9ZQL41+UMZsNMfDE9JpXR3AaVA5p+Y52
wDThK4ZZd0UFLhTit/rB
=LlSU
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-1730-1
February 20, 2013

keystone vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 12.10
- Ubuntu 12.04 LTS

Summary:

Keystone could be made to crash or expose sensitive information over the
network.

Software Description:
- keystone: OpenStack identity service

Details:

Nathanael Burton discovered that Keystone did not properly verify disabled
users. An authenticated but disabled user would continue to have access
rights that were removed. (CVE-2013-0282)

Jonathan Murray discovered that Keystone would allow XML entity processing.
A remote unauthenticated attacker could exploit this to cause a denial of
service via resource exhaustion. Authenticated users could also use this to
view arbitrary files on the Keystone server. (CVE-2013-1664, CVE-2013-1665)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.10:
python-keystone 2012.2.1-0ubuntu1.2

Ubuntu 12.04 LTS:
python-keystone 2012.1+stable~20120824-a16a0ab9-0ubuntu2.5

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-1730-1
CVE-2013-0282, CVE-2013-1664, CVE-2013-1665

Package Information:
https://launchpad.net/ubuntu/+source/keystone/2012.2.1-0ubuntu1.2

https://launchpad.net/ubuntu/+source/keystone/2012.1+stable~20120824-a16a0ab9-0ubuntu2.5

No comments:

Post a Comment