CVE-2013-0270

NameCVE-2013-0270
DescriptionA flaw was found in OpenStack Keystone. A remote attacker could exploit this vulnerability by sending a large HTTP request, specifically by providing a long tenant name when requesting a token. This could lead to a denial of service, consuming excessive CPU and memory resources on the affected system.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
keystone (PTS)bullseye2:18.0.0-3+deb11u1fixed
bullseye (security)2:18.1.0-1+deb11u2fixed
bookworm, bookworm (security)2:22.0.2-0+deb12u1fixed
trixie (security), trixie2:27.0.0-3+deb13u1fixed
forky, sid2:29.0.1-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
keystonesource(unstable)2013.1.1-2

Notes

[wheezy] - keystone <no-dsa> (Too intrusive to backport)
https://bugs.launchpad.net/keystone/+bug/1099025
See notes on ubuntu security tracker, change too intrusive to be backported

Search for package or bug name: Reporting problems