Security Advisory Moderate: openstack-keystone security and bug fix update

Advisory: RHSA-2014:0089-1
Type: Security Advisory
Severity: Moderate
Issued on: 2014-01-22
Last updated on: 2014-01-22
Affected Products: Red Hat OpenStack 4.0
CVEs (cve.mitre.org): CVE-2013-6391

Details

Updated openstack-keystone packages that fix one security issue and several
bugs are now available for Red Hat Enterprise Linux OpenStack Platform 4.0.

The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

The openstack-keystone packages provide keystone, a Python implementation
of the OpenStack Identity service API, which provides Identity, Token,
Catalog, and Policy services.

It was found that the ec2token API in keystone, which is used to generate
EC2-style (Amazon Elastic Compute Cloud) credentials, could generate a
token not scoped to a particular trust when creating a token from a
received trust-scoped token. A remote attacker could use this flaw to
retrieve a token that elevated their privileges to all of the trustor's
roles. Note that only OpenStack Identity setups that have EC2-style
authentication enabled were affected. (CVE-2013-6391)

Red Hat would like to thank Jeremy Stanley of the OpenStack Project for
reporting this issue. Upstream acknowledges Steven Hardy of Red Hat as the
original reporter.

These updated packages have been upgraded to upstream version 2013.2.1,
which provides a number of bug fixes over the previous version.
(BZ#1045408)

All openstack-keystone users are advised to upgrade to these updated
packages, which correct these issues.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258

Updated packages

Red Hat OpenStack 4.0

SRPMS:
openstack-keystone-2013.2.1-1.el6ost.src.rpm
File outdated by:  RHSA-2014:1688
    MD5: 342ca683d897f12f424e738b8078ab40
SHA-256: 8c9db587cb95abd3da9750741417e445f57232552863313f8c82323c637ab4e1
 
x86_64:
openstack-keystone-2013.2.1-1.el6ost.noarch.rpm
File outdated by:  RHSA-2014:1688
    MD5: 640554abd6dad767ae6bf55a2a495573
SHA-256: e9f2b0ad7d8ace691a7bceeb1ce691c3554023f16ed76efbaa9e19ff79816866
openstack-keystone-doc-2013.2.1-1.el6ost.noarch.rpm
File outdated by:  RHSA-2014:1688
    MD5: c584be0c9b6cff2a69fd8544253adffb
SHA-256: 8bf0fff322e93592fdefee9da5cfb9a7165f038ab6c68f580fe699cf9b8ae1e2
python-keystone-2013.2.1-1.el6ost.noarch.rpm
File outdated by:  RHSA-2014:1688
    MD5: 15f06a93c52d52a77ac5fc0095b7d356
SHA-256: 6a18325fb59ea95d31e70f8dd7d99c02d2509bfca6b97831ee8ab4443eb4bc8a
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

1039164 - CVE-2013-6391 OpenStack Keystone: trust circumvention through EC2-style tokens


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/