Search for packages
| purl | pkg:deb/debian/keystone@0?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-6fhd-mggs-j3c9 | OpenStack: Keystone /etc/keystone/ec2rc secret key exposure |
CVE-2012-5483
|
| VCID-7rg3-te3d-3qa9 | openstack-keystone: Insecure management of LDAP and admin_token configuration file values |
CVE-2013-1977
|
| VCID-p776-3n3m-wkhz | python-keystoneclient before 0.2.4, as used in OpenStack Keystone (Folsom), does not properly check expiry for PKI tokens, which allows remote authenticated users to (1) retain use of a token after it has expired, or (2) use a revoked token once it expires. |
CVE-2013-2104
GHSA-4rrr-j7ff-r844 PYSEC-2014-69 |
| VCID-qtvd-85ab-tygr | OpenStack Keystone, as used in OpenStack Folsom 2012.2, does not properly implement token expiration, which allows remote authenticated users to bypass intended authorization restrictions by creating new tokens through token chaining. NOTE: this issue exists because of a CVE-2012-3426 regression. |
CVE-2012-5563
GHSA-w66p-78g4-mr7g PYSEC-2012-20 |
| VCID-s62y-6nw4-j7gt | OpenStack Keystone Folsom (2012.2) does not properly perform revocation checks for Keystone PKI tokens when done through a server, which allows remote attackers to bypass intended access restrictions via a revoked PKI token. |
CVE-2013-1865
GHSA-22q6-wwq7-2jj9 PYSEC-2013-39 |