Token invalidation in case of role grant/revoke should be limited to affected tenant
Bug #1050025 reported by
Russell Bryant
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
OpenStack Identity (keystone) |
Fix Released
|
Medium
|
Dolph Mathews | ||
Essex |
Fix Released
|
Medium
|
Alan Pevec | ||
keystone (Ubuntu) |
Fix Released
|
Undecided
|
Unassigned | ||
Precise |
Fix Released
|
Undecided
|
Unassigned |
Bug Description
We just released this security advisory:
https:/
Soren Hansen brought up a potential problem here:
https:/
Although this can't be used as an attack vector (see comments below), token invalidation should really be limited to affected tenant.
Related branches
lp://staging/~openstack-ubuntu-testing/keystone/precise-essex-proposed
- Ubuntu Server Developers: Pending requested
-
Diff: 13 lines (+6/-0)1 file modifieddebian/changelog (+6/-0)
lp://staging/~yolanda.robla/ubuntu/precise/keystone/essex-sru
- James Page: Approve
-
Diff: 33638 lines (+30158/-3073)34 files modified.pc/applied-patches (+0/-3)
.pc/fix-ubuntu-tests.patch/tests/test_keystoneclient.py (+9/-9)
.pc/keystone-CVE-2012-3542.patch/keystone/identity/core.py (+0/-625)
.pc/keystone-CVE-2012-4413.patch/keystone/identity/core.py (+0/-626)
.pc/keystone-CVE-2012-4413.patch/keystone/token/core.py (+0/-107)
.pc/keystone-CVE-2012-4413.patch/tests/test_keystoneclient.py (+0/-970)
.pc/keystone-CVE-2012-5571.patch/keystone/contrib/ec2/core.py (+0/-347)
ChangeLog (+29735/-0)
PKG-INFO (+10/-0)
debian/changelog (+29/-0)
debian/keystone.logrotate (+3/-0)
debian/patches/fix-ubuntu-tests.patch (+10/-12)
debian/patches/keystone-CVE-2012-3542.patch (+0/-18)
debian/patches/keystone-CVE-2012-4413.patch (+0/-147)
debian/patches/keystone-CVE-2012-5571.patch (+0/-62)
debian/patches/series (+0/-3)
doc/keystone_compat_flows.sdx (+0/-99)
keystone.egg-info/PKG-INFO (+10/-0)
keystone.egg-info/SOURCES.txt (+176/-0)
keystone.egg-info/dependency_links.txt (+1/-0)
keystone.egg-info/not-zip-safe (+1/-0)
keystone.egg-info/requires.txt (+11/-0)
keystone.egg-info/top_level.txt (+1/-0)
keystone/identity/core.py (+4/-4)
keystone/token/backends/kvs.py (+13/-8)
keystone/token/backends/memcache.py (+31/-1)
keystone/token/backends/sql.py (+6/-1)
keystone/token/core.py (+11/-5)
setup.cfg (+8/-11)
setup.py (+1/-1)
tests/test_backend.py (+56/-5)
tests/test_backend_memcache.py (+29/-6)
tests/test_keystoneclient.py (+1/-1)
tools/pip-requires (+2/-2)
security vulnerability: | no → yes |
Changed in keystone: | |
milestone: | none → folsom-rc1 |
Changed in keystone: | |
status: | Incomplete → Confirmed |
Changed in keystone: | |
assignee: | nobody → Dolph Mathews (dolph) |
summary: |
- Potential problem with fix for "Revoking a role does not affect existing - tokens (CVE-2012-4413)" + Token invalidation in case of role grant/revoke should be limited to + affected tenant |
security vulnerability: | yes → no |
description: | updated |
Changed in keystone: | |
milestone: | none → folsom-rc1 |
tags: | added: essexbackport |
tags: |
added: essex-backport removed: essexbackport |
Changed in keystone: | |
status: | Fix Committed → Fix Released |
Changed in keystone: | |
milestone: | folsom-rc1 → 2012.2 |
Changed in keystone (Ubuntu): | |
status: | New → Fix Released |
Changed in keystone (Ubuntu Precise): | |
status: | New → Confirmed |
To post a comment you must log in.
Yeah, I was kinda supposing it would only invalidate the tokens for the tenant the role was granted to/revoked from... but not sure anymore now.