Описание
A flaw was found in openstack-keystone. Only the first 72 characters of an application secret are verified allowing attackers bypass some password complexity which administrators may be counting on. The highest threat from this vulnerability is to data confidentiality and integrity.
Пакеты
| Пакет | Статус | Версия исправления | Релиз | Тип |
|---|---|---|---|---|
| keystone | fixed | 2:23.0.0-3 | package | |
| keystone | no-dsa | bookworm | package | |
| keystone | no-dsa | bullseye | package | |
| keystone | end-of-life | stretch | package |
Примечания
https://bugzilla.redhat.com/show_bug.cgi?id=1962908
https://bugs.launchpad.net/keystone/+bug/1901891
https://opendev.org/openstack/keystone/commit/6730c761d18aa547998f2add833c13f45f257fe7
Fixed in 22.0.1
EPSS
Связанные уязвимости
A flaw was found in openstack-keystone. Only the first 72 characters of an application secret are verified allowing attackers bypass some password complexity which administrators may be counting on. The highest threat from this vulnerability is to data confidentiality and integrity.
A flaw was found in openstack-keystone. Only the first 72 characters of an application secret are verified allowing attackers bypass some password complexity which administrators may be counting on. The highest threat from this vulnerability is to data confidentiality and integrity.
A flaw was found in openstack-keystone. Only the first 72 characters of an application secret are verified allowing attackers bypass some password complexity which administrators may be counting on. The highest threat from this vulnerability is to data confidentiality and integrity.
Openstack Keystone Incorrect Authorization vulnerability
EPSS