Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 583392 (CVE-2016-4911)

Summary: <sys-auth/keystone-9.0.0-r1: Incorrect Audit IDs in Keystone Fernet Tokens can result in revocation bypass (CVE-2016-4911)
Product: Gentoo Security Reporter: Agostino Sarubbo <ago>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: RESOLVED FIXED    
Severity: minor    
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
URL: https://bugzilla.redhat.com/show_bug.cgi?id=1337079
Whiteboard: ~3 [noglsa]
Package list:
Runtime testing required: ---

Description Agostino Sarubbo gentoo-dev 2016-05-18 10:13:19 UTC
From ${URL} :

A vulnerability was found in the Keystone Fernet Token Provider. By rescoping a token a user will 
receive a new token without correct audit_ids, these incorrect audit_ids will prevent the entire 
chain of tokens from being revoked properly. This vulnerability does not impact revoking a token by 
it's individual audit_id. Only deployments with Keystone configured to use Fernet tokens are 
impacted.

References:

http://seclists.org/oss-sec/2016/q2/358
https://bugs.launchpad.net/keystone/+bug/1577558


@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Comment 1 Matthew Thode ( prometheanfire ) archtester Gentoo Infrastructure gentoo-dev Security 2016-05-18 15:11:33 UTC
I've confirmed that <keystone-9 is not impacted by this bug.  I've patched and removed the badness, removing myself/project as we are completed here.
Comment 2 Agostino Sarubbo gentoo-dev 2016-05-19 07:11:13 UTC
Closing as noglsa.