OpenStack Keystone 15.0.0 and 16.0.0 is affected by Data Leakage in the list credentials API. Any user with a role on a project is able to list any credentials with the /v3/credentials API when enforcescope is false. Users with a role on a project are able to view any other users' credentials, which could (for example) leak sign-on information for Time-based One Time Passwords (TOTP). Deployments with enforcescope set to false are affected. (There will be a slight performance impact for the list credentials API once this issue is fixed.)
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "2:9.3.0-0ubuntu3.2", "binary_name": "keystone" }, { "binary_version": "2:9.3.0-0ubuntu3.2", "binary_name": "keystone-doc" }, { "binary_version": "2:9.3.0-0ubuntu3.2", "binary_name": "python-keystone" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "2:13.0.2-0ubuntu1", "binary_name": "keystone" }, { "binary_version": "2:13.0.2-0ubuntu1", "binary_name": "keystone-doc" }, { "binary_version": "2:13.0.2-0ubuntu1", "binary_name": "python-keystone" } ] }