Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1337079 - (CVE-2016-4911) CVE-2016-4911 openstack-keystone: Incorrect Audit IDs in Keystone Fernet Tokens can result in revocation bypass
CVE-2016-4911 openstack-keystone: Incorrect Audit IDs in Keystone Fernet Toke...
Status: CLOSED UPSTREAM
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20160517,repor...
: Security
Depends On: 1337345 1337346
Blocks: 1337081
  Show dependency treegraph
 
Reported: 2016-05-18 04:59 EDT by Andrej Nemec
Modified: 2016-08-11 19:15 EDT (History)
32 users (show)

See Also:
Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2016-08-11 19:15:19 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)
mitaka patch (4.27 KB, patch)
2016-06-01 23:40 EDT, Garth Mollett
no flags Details | Diff

  None (edit)
Description Andrej Nemec 2016-05-18 04:59:40 EDT
A vulnerability was found in the Keystone Fernet Token Provider. By rescoping a token a user will receive a new token without correct audit_ids, these incorrect audit_ids will prevent the entire chain of tokens from being revoked properly. This vulnerability does not impact revoking a token by it's individual audit_id. Only deployments with Keystone configured to use Fernet tokens are impacted.

References:

http://seclists.org/oss-sec/2016/q2/358
https://bugs.launchpad.net/keystone/+bug/1577558
Comment 2 Garth Mollett 2016-06-01 23:40 EDT
Created attachment 1163873 [details]
mitaka patch

Note You need to log in before you can comment on or make changes to this bug.