Safety vulnerability ID: 35459
The information on this page was manually curated by our Cybersecurity Intelligence Team.
The (1) mamcache and (2) KVS token backends in OpenStack Identity (Keystone) Folsom 2012.2.x and Grizzly before 2013.1.4 do not properly compare the PKI token revocation list with PKI tokens, which allow remote attackers to bypass intended access restrictions via a revoked PKI token.
Latest version: 26.0.0
OpenStack Identity
The (1) mamcache and (2) KVS token backends in OpenStack Identity (Keystone) Folsom 2012.2.x and Grizzly before 2013.1.4 do not properly compare the PKI token revocation list with PKI tokens, which allow remote attackers to bypass intended access restrictions via a revoked PKI token.
MLIST:[oss-security] 20130911 [OSSA 2013-025] Token revocation failure using Keystone memcache/KVS backends (CVE-2013-4294): http://seclists.org/oss-sec/2013/q3/586
CONFIRM:https://bugs.launchpad.net/keystone/+bug/1202952: https://bugs.launchpad.net/keystone/+bug/1202952
REDHAT:RHSA-2013:1285: http://rhn.redhat.com/errata/RHSA-2013-1285.html
UBUNTU:USN-2002-1: http://www.ubuntu.com/usn/USN-2002-1
OSVDB:97237: http://osvdb.org/97237
SECUNIA:54706: http://secunia.com/advisories/54706
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application