Bug 855491 (CVE-2012-4413)

Summary: CVE-2012-4413 OpenStack-Keystone: role revocation token issues
Product: [Other] Security Response Reporter: Kurt Seifried <kseifried>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: apevec, jrusnack, markmc, mjc, security-response-team
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard: impact=moderate,public=20120912,reported=20120907,source=distros,cvss2=4.0/AV:N/AC:L/Au:S/C:N/I:P/A:N,openstack-1/openstack-keystone=affected,fedora-all/openstack-keystone=affected,epel-6/openstack-keystone=affected,cwe=CWE-613
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2012-10-16 14:17:04 EDT Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---
Bug Depends On: 856708, 856712, 856720    
Bug Blocks: 836072, 852512    
Attachments:
Description Flags
CVE-2012-4413-master-v4.txt
none
CVE-2012-4413-stable-essex-v4.txt none

Description Kurt Seifried 2012-09-08 00:08:52 EDT
Russell Bryant (rbryant@redhat.com) of the OpenStack Project reports:

Title: Revoking a role does not affect existing tokens
Impact: High
Reporter: Dolph Mathews (Rackspace)
Products: Keystone
Affects: Essex, Folsom

Description:
Dolph Mathews reported a vulnerability in Keystone. Granting and
revoking roles from a user is not reflected upon token validation for
pre-existing tokens. Pre-existing tokens continue to be valid for the
original set of roles for the remainder of the token's lifespan, or
until explicitly invalidated. This fix invalidates all tokens held by
a user upon role grant/revoke to circumvent the issue.
Comment 1 Kurt Seifried 2012-09-08 00:13:14 EDT
See the attached patches. For Essex, the following patch also needs to
be in place before the fix for the vulnerability will be fully
effective: https://review.openstack.org/#/c/12590/. The equivalent
patch for the memcached token backend in Folsom has already been merged.
Comment 2 Kurt Seifried 2012-09-08 00:18:46 EDT
Created attachment 610928 [details]
CVE-2012-4413-master-v4.txt
Comment 3 Kurt Seifried 2012-09-08 00:19:12 EDT
Created attachment 610929 [details]
CVE-2012-4413-stable-essex-v4.txt
Comment 5 Kurt Seifried 2012-09-12 11:48:23 EDT
This has now been released publicly:

https://review.openstack.org/#/c/12868/
Comment 7 Kurt Seifried 2012-09-12 11:57:30 EDT
Created openstack-keystone tracking bugs for this issue

Affects: fedora-all [bug 856712]
Comment 8 Kurt Seifried 2012-09-12 12:06:44 EDT
Created openstack-keystone tracking bugs for this issue

Affects: epel-6 [bug 856720]
Comment 9 Murray McAllister 2012-09-24 22:05:50 EDT
Acknowledgements:

Red Hat would like to thank Dolph Mathews for reporting this issue.
Comment 10 errata-xmlrpc 2012-10-16 13:25:53 EDT
This issue has been addressed in following products:

  OpenStack Essex for RHEL 6

Via RHSA-2012:1378 https://rhn.redhat.com/errata/RHSA-2012-1378.html