A flaw was found in Keystone. There is a time lag (up to one hour in a default configuration) between when security policy says a token should be revoked from when it is actually revoked. This could allow a remote administrator to secretly maintain access for longer than expected.
The product uses a cryptographic key or password past its expiration date, which diminishes its safety significantly by increasing the timing window for cracking attacks against that key.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Keystone | Openstack | - (including) | - (including) |
Keystone | Ubuntu | bionic | * |
Keystone | Ubuntu | devel | * |
Keystone | Ubuntu | esm-infra/bionic | * |
Keystone | Ubuntu | esm-infra/xenial | * |
Keystone | Ubuntu | focal | * |
Keystone | Ubuntu | jammy | * |
Keystone | Ubuntu | kinetic | * |
Keystone | Ubuntu | lunar | * |
Keystone | Ubuntu | mantic | * |
Keystone | Ubuntu | noble | * |
Keystone | Ubuntu | oracular | * |
Keystone | Ubuntu | trusty | * |
Keystone | Ubuntu | xenial | * |