{"id":"PYSEC-2014-107","details":"The MySQL token driver in OpenStack Identity (Keystone) 2014.1.x before 2014.1.2.1 and Juno before Juno-3 stores timestamps with the incorrect precision, which causes the expiration comparison for tokens to fail and allows remote authenticated users to retain access via an expired token.","aliases":["CVE-2014-5251","GHSA-gmvp-5rf9-mxcm"],"modified":"2024-11-25T22:42:21.549022Z","published":"2014-08-25T14:55:00Z","references":[{"type":"WEB","url":"https://bugs.launchpad.net/keystone/+bug/1347961"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2014/08/15/6"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2324-1"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2014-1121.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2014-1122.html"}],"affected":[{"package":{"name":"keystone","ecosystem":"PyPI","purl":"pkg:pypi/keystone"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8.0.0a0"}]}],"database_specific":{"source":"https://github.com/pypa/advisory-database/blob/main/vulns/keystone/PYSEC-2014-107.yaml"}}],"schema_version":"1.7.3"}