Hi Thomas, On Thu, Sep 12, 2013 at 02:35:18PM +0800, Thomas Goirand wrote: > On 09/12/2013 04:40 AM, Salvatore Bonaccorso wrote: > > Package: keystone > > Version: 2013.1.3-1 > > Severity: important > > Tags: security patch upstream > > > > Hi, > > > > the following vulnerability was published for keystone. > > > > CVE-2013-4294[0]: > > Token revocation failure using Keystone memcache/KVS backends > > > > See furthermore [1] for upstream announce. > > > > If you fix the vulnerability please also make sure to include the > > CVE (Common Vulnerabilities & Exposures) id in your changelog entry. > > > > For further information see: > > > > [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4294 > > http://security-tracker.debian.org/tracker/CVE-2013-4294 > > [1] > > http://lists.openstack.org/pipermail/openstack-announce/2013-September/000142.html > > > > Regards, > > Salvatore > > Hi Salvatore. > > Please note that this only affects Keystone in Sid/Jessie, since it > deals with PKI tokens, which is a feature added after the version in > Wheezy. Please update the tracker accordingly.
Yes indeed. I have marked wheezy not-affected in the tracker already yesterday after checking that. Thanks for confirming that this is true. Regards, Salvatore -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org