[ubuntu/quantal-proposed] keystone 2012.2.4-0ubuntu3 (Accepted)

James Page james.page at ubuntu.com
Wed May 29 21:03:48 UTC 2013


keystone (2012.2.4-0ubuntu3) quantal-proposed; urgency=low

  * debian/patches/update_certs.patch: Fix FTBFS.  Original SSL certs
    for test suite expired May 18 2013. Cherry-picked regenerated certs
    from stable/folsom commit c14f2789.

keystone (2012.2.4-0ubuntu2) quantal-proposed; urgency=low

  * Rebase on latest security fixes.
  * SECURITY UPDATE: delete user token immediately upon delete when using v2
    API
    - CVE-2013-2059.patch: adjust keystone/identity/core.py to call
      token_api.delete_token() during delete. Also update test suite.
    - CVE-2013-2059
    - LP: #1166670

keystone (2012.2.4-0ubuntu1) quantal-proposed; urgency=low

  * Dropped patches, applied upstream:
    - debian/patches/CVE-2013-1865.patch: [255b1d4]
    - debian/patches/CVE-2013-0282.patch: [f0b4d30]
    - debian/patches/CVE-2013-1664+1665.patch: [8a22745]
  * Resynchronize with stable/folsom (09f28020) (LP: #1179707):
    - [5ea4fcf] V2 API reported at Beta LP: 1135230
    - [1889299] PKI-signed token hash saved as token ID for SQL backend only
      LP: 1073272
    - [40660f0] Key PKI tokens on hash in memcached for auth_token middleware
      LP: 1073343
    - [b3ce6a7] Use the right subprocess based on os monkeypatch
    - [bb1ded0] keystone-all --config-dir is being ignored LP: 1101129
    - [9e0a97d] Temporary network outage results in connection refused and
      invalid token LP: 1150299
    - [255b1d4] Validation of PKI tokens bypasses revocation check LP: 1129713
    - [8690166] PKI tokens are broken after 24 hours LP: 1074172
    - [790c87e] PKI tokens are broken after 24 hours LP: 1074172
    - [f0b4d30] EC2 authentication does not ensure user or tenant is enabled
      LP: 1121494
    - [8a22745] DoS through XML entity expansion (CVE-2013-1664) LP: 1100282

Date: Wed, 29 May 2013 20:59:34 +0100
Changed-By: James Page <james.page at ubuntu.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
https://launchpad.net/ubuntu/quantal/+source/keystone/2012.2.4-0ubuntu3
-------------- next part --------------
Format: 1.8
Date: Wed, 29 May 2013 20:59:34 +0100
Source: keystone
Binary: python-keystone keystone keystone-doc
Architecture: source
Version: 2012.2.4-0ubuntu3
Distribution: quantal-proposed
Urgency: low
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: James Page <james.page at ubuntu.com>
Description: 
 keystone   - OpenStack identity service - Daemons
 keystone-doc - OpenStack identity service - Documentation
 python-keystone - OpenStack identity service - Python library
Launchpad-Bugs-Fixed: 1166670 1179707
Changes: 
 keystone (2012.2.4-0ubuntu3) quantal-proposed; urgency=low
 .
   * debian/patches/update_certs.patch: Fix FTBFS.  Original SSL certs
     for test suite expired May 18 2013. Cherry-picked regenerated certs
     from stable/folsom commit c14f2789.
 .
 keystone (2012.2.4-0ubuntu2) quantal-proposed; urgency=low
 .
   * Rebase on latest security fixes.
   * SECURITY UPDATE: delete user token immediately upon delete when using v2
     API
     - CVE-2013-2059.patch: adjust keystone/identity/core.py to call
       token_api.delete_token() during delete. Also update test suite.
     - CVE-2013-2059
     - LP: #1166670
 .
 keystone (2012.2.4-0ubuntu1) quantal-proposed; urgency=low
 .
   * Dropped patches, applied upstream:
     - debian/patches/CVE-2013-1865.patch: [255b1d4]
     - debian/patches/CVE-2013-0282.patch: [f0b4d30]
     - debian/patches/CVE-2013-1664+1665.patch: [8a22745]
   * Resynchronize with stable/folsom (09f28020) (LP: #1179707):
     - [5ea4fcf] V2 API reported at Beta LP: 1135230
     - [1889299] PKI-signed token hash saved as token ID for SQL backend only
       LP: 1073272
     - [40660f0] Key PKI tokens on hash in memcached for auth_token middleware
       LP: 1073343
     - [b3ce6a7] Use the right subprocess based on os monkeypatch
     - [bb1ded0] keystone-all --config-dir is being ignored LP: 1101129
     - [9e0a97d] Temporary network outage results in connection refused and
       invalid token LP: 1150299
     - [255b1d4] Validation of PKI tokens bypasses revocation check LP: 1129713
     - [8690166] PKI tokens are broken after 24 hours LP: 1074172
     - [790c87e] PKI tokens are broken after 24 hours LP: 1074172
     - [f0b4d30] EC2 authentication does not ensure user or tenant is enabled
       LP: 1121494
     - [8a22745] DoS through XML entity expansion (CVE-2013-1664) LP: 1100282
Checksums-Sha1: 
 2fa2674b200e415342e481a3326f220da8c144bd 2506 keystone_2012.2.4-0ubuntu3.dsc
 bf9743d768d2e5fcea1aff5b372a8550159dc0f2 26279 keystone_2012.2.4-0ubuntu3.debian.tar.gz
Checksums-Sha256: 
 3affbaa30085b0c354e4ccaae161321f1df09476c26c2c230d0c0e3c07a17f00 2506 keystone_2012.2.4-0ubuntu3.dsc
 14773716404f5485521564573bb2013bb42bf9d9b8a118d90ee956c6614194cd 26279 keystone_2012.2.4-0ubuntu3.debian.tar.gz
Files: 
 dc8ad64c30bc1653a2fd9a61f9c82c30 2506 net extra keystone_2012.2.4-0ubuntu3.dsc
 054965f5b3ccb333d89414f17ca9a2ea 26279 net extra keystone_2012.2.4-0ubuntu3.debian.tar.gz
Original-Maintainer: Monty Taylor <mordred at inaugust.com>


More information about the Quantal-changes mailing list