Total vulnerabilities in the database
A flaw was found in Keystone. There is a time lag (up to one hour in a default configuration) between when security policy says a token should be revoked from when it is actually revoked. This could allow a remote administrator to secretly maintain access for longer than expected.
Software | From | Fixed in |
---|---|---|
redhat / storage | 3.0 | 3.0.x |
redhat / quay | 3.0.0 | 3.0.0.x |
redhat / openstack_platform | 16.1 | 16.1.x |
redhat / openstack_platform | 16.2 | 16.2.x |