This bug was fixed in the package keystone - 2:13.0.4-0ubuntu1 --------------- keystone (2:13.0.4-0ubuntu1) bionic-security; urgency=medium
[ Chris MacNaughton ] * d/watch: Update to point at opendev.org. * New stable point release for OpenStack Queens (LP: #1893234). - d/p/0001-fixing-dn-to-id.patch: Dropped. Fixed in upstream release. [ Corey Bryant ] * SECURITY UPDATE: EC2 and/or credential endpoints are not protected from a scoped context. Keystone V3 /credentials endpoint policy logic allows to change credentials owner or target project ID. - debian/patches/CVE-2020-12689-CVE-2020-12691.patch: Fix security issues with EC2 credentials, addressing several issues in the creation and use of EC2/S3 credentials with keystone tokens. - CVE-2020-12689, CVE-2020-12691 * SECURITY UPDATE: OAuth1 request token authorize silently ignores roles parameter. - debian/patches/CVE-2020-12690.patch: Ensure OAuth1 authorized roles are respected. - CVE-2020-12691 * SECURITY UPDATE: Keystone doesn't check signature TTL of the EC2 credential auth method. - debian/patches/CVE-2020-12692.patch: Check timestamp of signed EC2 token request. - CVE-2020-12692 -- Corey Bryant <corey.bry...@canonical.com> Fri, 28 Aug 2020 09:29:34 -0400 ** Changed in: keystone (Ubuntu Bionic) Status: Triaged => Fix Released ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-12689 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-12690 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-12691 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-12692 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1893234 Title: [SRU] queens stable releases To manage notifications about this bug go to: https://bugs.launchpad.net/cloud-archive/+bug/1893234/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs