Kay discovered that OpenStack Keystone incorrectly handled the ec2tokens and s3tokens APIs. A remote attacker could possibly use this issue to obtain unauthorized access and escalate privileges.
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "keystone",
"binary_version": "2:25.0.0-0ubuntu1.1"
},
{
"binary_name": "keystone-common",
"binary_version": "2:25.0.0-0ubuntu1.1"
},
{
"binary_name": "python3-keystone",
"binary_version": "2:25.0.0-0ubuntu1.1"
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "keystone",
"binary_version": "2:28.0.0-0ubuntu1.1"
},
{
"binary_name": "keystone-common",
"binary_version": "2:28.0.0-0ubuntu1.1"
},
{
"binary_name": "python3-keystone",
"binary_version": "2:28.0.0-0ubuntu1.1"
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "keystone",
"binary_version": "2:27.0.0-0ubuntu1.1"
},
{
"binary_name": "keystone-common",
"binary_version": "2:27.0.0-0ubuntu1.1"
},
{
"binary_name": "python3-keystone",
"binary_version": "2:27.0.0-0ubuntu1.1"
}
]
}