[Bug 1068851] Re: Openssl tests rely on expired certificate
Launchpad Bug Tracker
1068851 at bugs.launchpad.net
Tue Jan 29 13:20:28 UTC 2013
This bug was fixed in the package keystone - 2012.2.1-0ubuntu1
---------------
keystone (2012.2.1-0ubuntu1) quantal-proposed; urgency=low
* Ubuntu updates:
- debian/control: Ensure keystoneclient is upgraded with keystone,
require python-keystoneclient >= 1:0.1.3. (LP: #1073273)
- Dropped patches, applied upsteram:
- debian/patches/CVE-2012-5563.patch
- debian/patches/CVE-2012-5571.patch
- debian/patches/fix-ssl-tests-lp1068851.patch
* Resynchronize with stable/folsom (7869c3ec) (LP: #1085255):
- [f9d4766] token expires time incorrect for auth by one token
(LP: #1079216)
- [80d63c8] keystone throws error when removing user from tenant.
(LP: #1078497)
- [37308dd] Removing user from a tenant isn't invalidating user access to
tenant (LP: #1064914)
- [bec9b68] Redo part of bp/sql-identiy-pam undone by bug 968519
(LP: #1068674)
- [ee645e6] Jenkins jobs fail because of incompatibility between sqlalchemy-
migrate and the newest sqlalchemy-0.8.0b1 (LP: #1073569)
- [094c494] Non PKI Tokens longer than 32 characters can never be valid
(LP: #1060389)
- [3cd343b] Openssl tests rely on expired certificate (LP: #1068851)
- [2f9807e] Set defaultbranch in .gitreview to stable/folsom
-- Adam Gandelman <adamg at ubuntu.com> Tue, 04 Dec 2012 09:19:41 -0800
** Changed in: keystone (Ubuntu Quantal)
Status: Fix Committed => Fix Released
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-5563
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-5571
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to keystone in Ubuntu.
https://bugs.launchpad.net/bugs/1068851
Title:
Openssl tests rely on expired certificate
To manage notifications about this bug go to:
https://bugs.launchpad.net/keystone/+bug/1068851/+subscriptions
More information about the Ubuntu-server-bugs
mailing list