CVE-2015-7546
Publication date 3 February 2016
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
The identity service in OpenStack Identity (Keystone) before 2015.1.3 (Kilo) and 8.0.x before 8.0.2 (Liberty) and keystonemiddleware (formerly python-keystoneclient) before 1.5.4 (Kilo) and Liberty before 2.3.3 does not properly invalidate authorization tokens when using the PKI or PKIZ token providers, which allows remote authenticated users to bypass intended access restrictions and gain access to cloud resources by manipulating byte fields within a revoked token.
Status
Package | Ubuntu Release | Status |
---|---|---|
keystone | ||
16.04 LTS xenial |
Not affected
|
|
14.04 LTS trusty | Not in release | |
python-keystonemiddleware | ||
16.04 LTS xenial |
Not affected
|
|
14.04 LTS trusty | Not in release | |
Notes
mdeslaur
we will not be fixing this in Ubuntu 14.04 LTS. Users are encouraged to migrate to a different token provider as described in the upstream advisory.
Patch details
Package | Patch details |
---|---|
keystone |
|
python-keystonemiddleware |
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.5 · High |
Attack vector | Network |
Attack complexity | High |
Privileges required | Low |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H |