Upstream information

CVE-2012-4413 at MITRE

Description

OpenStack Keystone 2012.1.3 does not invalidate existing tokens when granting or revoking roles, which allows remote authenticated users to retain the privileges of the revoked roles.

SUSE information

Overall state of this security issue: Resolved

This issue is currently not rated by SUSE as it is not affecting the SUSE Enterprise products.

CVSS v2 Scores
  National Vulnerability Database
Base Score 4
Vector AV:N/AC:L/Au:S/C:N/I:P/A:N
Access Vector Network
Access Complexity Low
Authentication Single
Confidentiality Impact None
Integrity Impact Partial
Availability Impact None
SUSE Bugzilla entry: 779477 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE OpenStack Cloud 6
  • openstack-keystone >= 8.0.2~a0~dev8-1.2
  • python-keystone >= 8.0.2~a0~dev8-1.2
Patchnames:
SUSE OpenStack Cloud 6 GA openstack-keystone-8.0.2~a0~dev34-1.4
SUSE OpenStack Cloud 6 GA openstack-keystone-8.0.2~a0~dev8-1.2


SUSE Timeline for this CVE

CVE page created: Fri Jun 28 08:45:21 2013
CVE page last modified: Sat Jun 15 21:40:54 2024