Kay discovered that OpenStack Keystone incorrectly handled the ec2tokens and s3tokens APIs. A remote attacker could possibly use this issue to obtain unauthorized access and escalate privileges.
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "2:25.0.0-0ubuntu1.1",
"binary_name": "keystone"
},
{
"binary_version": "2:25.0.0-0ubuntu1.1",
"binary_name": "keystone-common"
},
{
"binary_version": "2:25.0.0-0ubuntu1.1",
"binary_name": "python3-keystone"
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "2:28.0.0-0ubuntu1.1",
"binary_name": "keystone"
},
{
"binary_version": "2:28.0.0-0ubuntu1.1",
"binary_name": "keystone-common"
},
{
"binary_version": "2:28.0.0-0ubuntu1.1",
"binary_name": "python3-keystone"
}
]
}