UBUNTU-CVE-2014-5251

Source
https://ubuntu.com/security/CVE-2014-5251
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2014/UBUNTU-CVE-2014-5251.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2014-5251
Related
Published
2014-08-15T00:00:00Z
Modified
2014-08-15T00:00:00Z
Summary
[none]
Details

The MySQL token driver in OpenStack Identity (Keystone) 2014.1.x before 2014.1.2.1 and Juno before Juno-3 stores timestamps with the incorrect precision, which causes the expiration comparison for tokens to fail and allows remote authenticated users to retain access via an expired token.

References

Affected packages

Ubuntu:14.04:LTS / keystone

Package

Name
keystone
Purl
pkg:deb/ubuntu/keystone?arch=src?distro=trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:2014.1.2.1-0ubuntu1.1

Affected versions

1:2013.*

1:2013.2~rc4-0ubuntu1
1:2013.2-0ubuntu1
1:2013.2-0ubuntu1.1

1:2014.*

1:2014.1~b1-0ubuntu1
1:2014.1~b2-0ubuntu1
1:2014.1~b3-0ubuntu2
1:2014.1~b3-0ubuntu3
1:2014.1~rc1-0ubuntu1
1:2014.1~rc2-0ubuntu1
1:2014.1-0ubuntu1
1:2014.1.1-0ubuntu1
1:2014.1.2.1-0ubuntu1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "medium",
    "binaries": [
        {
            "binary_version": "1:2014.1.2.1-0ubuntu1.1",
            "binary_name": "keystone"
        },
        {
            "binary_version": "1:2014.1.2.1-0ubuntu1.1",
            "binary_name": "keystone-doc"
        },
        {
            "binary_version": "1:2014.1.2.1-0ubuntu1.1",
            "binary_name": "python-keystone"
        }
    ]
}