First published: Tue Nov 12 2019(Updated: )
OpenStack Keystone: extremely long passwords can crash Keystone by exhausting stack space
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/keystone | 2:14.2.0-0+deb10u1 2:18.0.0-3+deb11u1 2:22.0.0-2 2:24.0.0-1 | |
OpenStack Keystone | ||
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-1572 is a vulnerability in OpenStack Keystone where extremely long passwords can crash Keystone by exhausting stack space.
CVE-2012-1572 has a severity rating of 7.5, which is considered high.
OpenStack Keystone versions 2:14.2.0-0+deb10u1, 2:18.0.0-3+deb11u1, 2:22.0.0-2, and 2:24.0.0-1 are affected by CVE-2012-1572.
To fix CVE-2012-1572, you should update to a version of OpenStack Keystone that is not affected, such as versions after 2:24.0.0-1.
You can find more information about CVE-2012-1572 on the Debian Security Tracker and Bugzilla.