CVE-2020-12692

NameCVE-2020-12692
DescriptionAn issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. The EC2 API doesn't have a signature TTL check for AWS Signature V4. An attacker can sniff the Authorization header, and then use it to reissue an OpenStack token an unlimited number of times.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-4679-1
Debian Bugs959900

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
keystone (PTS)jessie2014.1.3-6vulnerable
stretch (security), stretch (lts), stretch2:10.0.0-9+deb9u1vulnerable
buster (security), buster, buster (lts)2:14.2.0-0+deb10u2fixed
bullseye2:18.0.0-3+deb11u1fixed
bookworm2:22.0.0-2fixed
sid, trixie2:26.0.0-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
keystonesourcewheezy(unfixed)end-of-life
keystonesourcejessie(unfixed)end-of-life
keystonesourcestretch(unfixed)end-of-life
keystonesourcebuster2:14.2.0-0+deb10u1DSA-4679-1
keystonesource(unstable)2:17.0.0~rc2-1959900

Notes

[stretch] - keystone <end-of-life> (Not supported in stretch LTS)
[jessie] - keystone <end-of-life> (Not supported in Jessie LTS)
https://bugs.launchpad.net/keystone/+bug/1872737
https://www.openwall.com/lists/oss-security/2020/05/06/4

Search for package or bug name: Reporting problems