[ubuntu/precise-proposed] keystone 2012.1.3+stable-20130423-f48dd0fc-0ubuntu1 (Accepted)

Yolanda yolanda.robla at canonical.com
Thu May 9 23:23:50 UTC 2013


keystone (2012.1.3+stable-20130423-f48dd0fc-0ubuntu1) precise-proposed; urgency=low

  * Resynchronize with stable/essex (LP: #1089488):
    - [7402f5e] EC2 authentication does not ensure user or tenant is enabled
      LP: 1121494
    - [8945567] DoS through XML entity expansion (CVE-2013-1664) LP: 1100282
    - [7b5b72f] Add size validations for /tokens.
    - [ef1e682] docutils 0.10 incompatible with sphinx 1.1.3 LP: 1091333
    - [8735009] Removing user from a tenant isn't invalidating user access to
      tenant (LP: #1064914)
    - [025b1d5] Jenkins jobs fail because of incompatibility between sqlalchemy-
      migrate and the newest sqlalchemy-0.8.0b1 (LP: #1073569)
    - [ddb4019] Open 2012.1.4 development
    - [0e1f05e] memcache driver needs protection against unicode user keys
      (LP: #1056373)
    - [176ee9b] Token invalidation in case of role grant/revoke should be
      limited to affected tenant (LP: #1050025)
    - [58ac669] Token validation includes revoked roles (CVE-2012-4413)
      (LP: #1041396)
    - [cd1e48a] Memcached Token Backend does not support list tokens
      (LP: #1046905)
    - [5438d3b] Update user's default tenant partially succeeds without authz
      (LP: #1040626)
  * Dropped patches, superseeded by new snapshot:
    - debian/patches/CVE-2013-0282.patch [7402f5e]
    - debian/patches/CVE-2013-1664+1665.patch [8945567]
    - debian/patches/keystone-CVE-2012-5571.patch [8735009]
    - debian/patches/keystone-CVE-2012-4413.patch [58ac669]
    - debian/patches/keystone-CVE-2012-3542.patch [5438d3b]
  * Refreshed patches:
    - debian/patches/CVE-2013-0247.patch
    - debian/patches/fix-ubuntu-tests.patch

Date: Tue, 23 Apr 2013 10:30:16 +0200
Changed-By: Yolanda <yolanda.robla at canonical.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Signed-By: James Page <james.page at ubuntu.com>
https://launchpad.net/ubuntu/precise/+source/keystone/2012.1.3+stable-20130423-f48dd0fc-0ubuntu1
-------------- next part --------------
Format: 1.8
Date: Tue, 23 Apr 2013 10:30:16 +0200
Source: keystone
Binary: python-keystone keystone keystone-doc
Architecture: source
Version: 2012.1.3+stable-20130423-f48dd0fc-0ubuntu1
Distribution: precise-proposed
Urgency: low
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Yolanda <yolanda.robla at canonical.com>
Description: 
 keystone   - OpenStack identity service - Daemons
 keystone-doc - OpenStack identity service - Documentation
 python-keystone - OpenStack identity service - Python library
Launchpad-Bugs-Fixed: 1040626 1041396 1046905 1050025 1056373 1064914 1073569 1089488
Changes: 
 keystone (2012.1.3+stable-20130423-f48dd0fc-0ubuntu1) precise-proposed; urgency=low
 .
   * Resynchronize with stable/essex (LP: #1089488):
     - [7402f5e] EC2 authentication does not ensure user or tenant is enabled
       LP: 1121494
     - [8945567] DoS through XML entity expansion (CVE-2013-1664) LP: 1100282
     - [7b5b72f] Add size validations for /tokens.
     - [ef1e682] docutils 0.10 incompatible with sphinx 1.1.3 LP: 1091333
     - [8735009] Removing user from a tenant isn't invalidating user access to
       tenant (LP: #1064914)
     - [025b1d5] Jenkins jobs fail because of incompatibility between sqlalchemy-
       migrate and the newest sqlalchemy-0.8.0b1 (LP: #1073569)
     - [ddb4019] Open 2012.1.4 development
     - [0e1f05e] memcache driver needs protection against unicode user keys
       (LP: #1056373)
     - [176ee9b] Token invalidation in case of role grant/revoke should be
       limited to affected tenant (LP: #1050025)
     - [58ac669] Token validation includes revoked roles (CVE-2012-4413)
       (LP: #1041396)
     - [cd1e48a] Memcached Token Backend does not support list tokens
       (LP: #1046905)
     - [5438d3b] Update user's default tenant partially succeeds without authz
       (LP: #1040626)
   * Dropped patches, superseeded by new snapshot:
     - debian/patches/CVE-2013-0282.patch [7402f5e]
     - debian/patches/CVE-2013-1664+1665.patch [8945567]
     - debian/patches/keystone-CVE-2012-5571.patch [8735009]
     - debian/patches/keystone-CVE-2012-4413.patch [58ac669]
     - debian/patches/keystone-CVE-2012-3542.patch [5438d3b]
   * Refreshed patches:
     - debian/patches/CVE-2013-0247.patch
     - debian/patches/fix-ubuntu-tests.patch
Checksums-Sha1: 
 403edddb761f0b9be395160ee337dec2e3cacede 2668 keystone_2012.1.3+stable-20130423-f48dd0fc-0ubuntu1.dsc
 83a7ffecc416784a1bf43e59ff5c22f401f9837f 456091 keystone_2012.1.3+stable-20130423-f48dd0fc.orig.tar.gz
 7e0d33c51990f9909f653a6a43ee3aadb0a36f48 13968 keystone_2012.1.3+stable-20130423-f48dd0fc-0ubuntu1.debian.tar.gz
Checksums-Sha256: 
 eb325ebdacf54c2ae26cb68be1608a4318a7072f00a3f64ba1feffddf2a542b2 2668 keystone_2012.1.3+stable-20130423-f48dd0fc-0ubuntu1.dsc
 d8d672cf6751ae9b3dac68a5d535f888280b09e463037a111da558e41d36167a 456091 keystone_2012.1.3+stable-20130423-f48dd0fc.orig.tar.gz
 dd5c4d0b2342bfbdb545e603785ae3550457998e21fdffc2962d32aa6e2f7618 13968 keystone_2012.1.3+stable-20130423-f48dd0fc-0ubuntu1.debian.tar.gz
Files: 
 d3be15a05cb56a7666ab37edda481d81 2668 net extra keystone_2012.1.3+stable-20130423-f48dd0fc-0ubuntu1.dsc
 975162b4945510cbd49c5995c1206151 456091 net extra keystone_2012.1.3+stable-20130423-f48dd0fc.orig.tar.gz
 9fccb4e128f14807f2da522198c3066f 13968 net extra keystone_2012.1.3+stable-20130423-f48dd0fc-0ubuntu1.debian.tar.gz
Original-Maintainer: Monty Taylor <mordred at inaugust.com>


More information about the Precise-changes mailing list