OSSA-2014-026: Multiple vulnerabilities in Keystone revocation events¶
- Date:
August 15, 2014
- CVE:
CVE-2014-5252, CVE-2014-5251, CVE-2014-5253
Affects¶
Keystone: 2014.1 versions up to 2014.1.1
Description¶
Lance Bragstad from Rackspace and Brant Knudson from IBM reported 3 vulnerabilities in Keystone revocation events. Lance Bragstad discovered that UUID v2 tokens processed by the V3 API are incorrectly updated and get their “issued_at” time regenerated (CVE-2014-5252). Brant Knudson discovered that the MySQL token driver stores expiration dates incorrectly which prevents manual revocation (CVE-2014-5251) and that domain-scoped tokens don’t get revoked when the domain is disabled (CVE-2014-5253). Tokens impacted by one of these bugs may allow a user to evade token revocation. Only Keystone setups configured to use revocation events are affected.
Patches¶
https://review.openstack.org/#/c/112087 (Icehouse)
https://review.openstack.org/#/c/111772 (Icehouse)
https://review.openstack.org/#/c/112083 (Icehouse)
https://review.openstack.org/#/c/112084 (Icehouse)
Credits¶
Lance Bragstad from Rackspace (CVE-2014-5252)
Brant Knudson from IBM (CVE-2014-5251, CVE-2014-5253)