Bug 1439586 (CVE-2017-2673)
| Summary: | CVE-2017-2673 openstack-keystone: Incorrect role assignment with federated Keystone | ||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | Adam Mariš <amaris> | ||||||||||||
| Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> | ||||||||||||
| Status: | CLOSED ERRATA | QA Contact: | |||||||||||||
| Severity: | high | Docs Contact: | |||||||||||||
| Priority: | high | ||||||||||||||
| Version: | unspecified | CC: | aortega, apevec, ayoung, chrisw, cvsbot-xmlrpc, gmollett, jdennis, jjoyce, jschluet, kbasil, lhh, lpeer, markmc, mburns, nkinder, rbryant, rcritten, rduartes, sclewis, security-response-team, slong, srevivo, tdecacqu, tsuter | ||||||||||||
| Target Milestone: | --- | Keywords: | Security | ||||||||||||
| Target Release: | --- | ||||||||||||||
| Hardware: | All | ||||||||||||||
| OS: | Linux | ||||||||||||||
| Whiteboard: | |||||||||||||||
| Fixed In Version: | Doc Type: | If docs needed, set a value | |||||||||||||
| Doc Text: |
An authorization-check flaw was discovered in federation configurations of the OpenStack Identity service (keystone). An authenticated federated user could request permissions to a project and unintentionally be granted all related roles including administrative roles.
|
Story Points: | --- | ||||||||||||
| Clone Of: | Environment: | ||||||||||||||
| Last Closed: | 2017-06-28 20:43:00 UTC | Type: | --- | ||||||||||||
| Regression: | --- | Mount Type: | --- | ||||||||||||
| Documentation: | --- | CRM: | |||||||||||||
| Verified Versions: | Category: | --- | |||||||||||||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||||||||||
| Cloudforms Team: | --- | Target Upstream Version: | |||||||||||||
| Embargoed: | |||||||||||||||
| Bug Depends On: | 1440644, 1441472, 1441592 | ||||||||||||||
| Bug Blocks: | 1439588 | ||||||||||||||
| Attachments: |
|
||||||||||||||
|
Description
Adam Mariš
2017-04-06 09:40:34 UTC
Acknowledgments: Name: the Openstack project Upstream: Boris Bobrov (Mail.Ru) Created attachment 1269600 [details]
master pike patch
Created attachment 1269602 [details]
stable ocata patch
new patches are under review upstream for newton, ocata and pike - will post them once they are accepted. Created attachment 1272868 [details]
cve-2017-2673-openstack-10-newton.patch
added new patch from upstream for openstack 10
Created attachment 1272869 [details]
cve-2017-2673-openstack-11-ocata.patch
Created attachment 1272870 [details]
cve-2017-2673-openstack-12-pike.patch
References: http://seclists.org/oss-sec/2017/q2/125 This issue has been addressed in the following products: Red Hat OpenStack Platform 9.0 (Mitaka) Via RHSA-2017:1461 https://access.redhat.com/errata/RHSA-2017:1461 This issue has been addressed in the following products: Red Hat OpenStack Platform 10.0 (Newton) Via RHSA-2017:1597 https://access.redhat.com/errata/RHSA-2017:1597 |