[Bug 1060389] Re: Non PKI Tokens longer than 32 characters can never be valid

Launchpad Bug Tracker 1060389 at bugs.launchpad.net
Tue Jan 29 13:20:28 UTC 2013

This bug was fixed in the package keystone - 2012.2.1-0ubuntu1

keystone (2012.2.1-0ubuntu1) quantal-proposed; urgency=low

  * Ubuntu updates:
    - debian/control: Ensure keystoneclient is upgraded with keystone,
      require python-keystoneclient >= 1:0.1.3. (LP: #1073273)
    - Dropped patches, applied upsteram:
      - debian/patches/CVE-2012-5563.patch
      - debian/patches/CVE-2012-5571.patch
      - debian/patches/fix-ssl-tests-lp1068851.patch
  * Resynchronize with stable/folsom (7869c3ec) (LP: #1085255):
    - [f9d4766] token expires time incorrect for auth by one token
      (LP: #1079216)
    - [80d63c8] keystone throws error when removing user from tenant.
      (LP: #1078497)
    - [37308dd] Removing user from a tenant isn't invalidating user access to
      tenant (LP: #1064914)
    - [bec9b68] Redo part of bp/sql-identiy-pam undone by bug 968519
      (LP: #1068674)
    - [ee645e6] Jenkins jobs fail because of incompatibility between sqlalchemy-
      migrate and the newest sqlalchemy-0.8.0b1 (LP: #1073569)
    - [094c494] Non PKI Tokens longer than 32 characters can never be valid
      (LP: #1060389)
    - [3cd343b] Openssl tests rely on expired certificate (LP: #1068851)
    - [2f9807e] Set defaultbranch in .gitreview to stable/folsom
 -- Adam Gandelman <adamg at ubuntu.com>   Tue, 04 Dec 2012 09:19:41 -0800

** Changed in: keystone (Ubuntu Quantal)
       Status: Fix Committed => Fix Released

** CVE added: http://www.cve.mitre.org/cgi-

** CVE added: http://www.cve.mitre.org/cgi-

You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to keystone in Ubuntu.

  Non PKI Tokens longer than 32 characters can never be valid

To manage notifications about this bug go to:

More information about the Ubuntu-server-bugs mailing list