[SECURITY] [DSA 6056-1] keystone security update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-6056-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
November 13, 2025 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : keystone
CVE ID : not yet available
A vulnerability was discovered in the ec2tokens and s3tokens APIs of
Keystone, the OpenStack identity service, which may result in
authorisation bypass or privilege escalation if /v3/ec2tokens or
/v3/s3tokens are reachable by unauthenticated clients.
The Swift object storage service also requires an update to work with
the updated Keystone: The update to Swift is provided as 2.30.1-0+deb12u1
for bookworm and 2.35.1-0+deb13u1 for trixie and is backwards-compatible
with older Keystone versions. As such, it is recommended to first upgrade
Swift before deploying the Keystone update.
For the oldstable distribution (bookworm), this problem has been fixed
in version 2:22.0.2-0+deb12u1.
For the stable distribution (trixie), this problem has been fixed in
version 2:27.0.0-3+deb13u1.
We recommend that you upgrade your keystone packages.
For the detailed security status of keystone please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/keystone
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmkWNysACgkQEMKTtsN8
TjYJtxAAv44mkJR8YFh3iSTolaDGA4KQEWiJcz3s2zdd3We+ALqsS9iv9ncWUT6T
3cfjUZff2BhRnqbcGxfcqYZbrxt3cpvWFXLkd7Kf24mz0tzr7nyVcw1T6hGt904O
UvbThQxXZAGFdBlaWSZH3b2HynYZKXfBohggcnWOWeviXd0t3vX3GeyOQodR09/v
u5cD2+YdpQHFsfWWNkoQOtc4Sc5sBTvQF/TpGTXBoE+CKCa+JC238iwp0i7r9QWG
MFmsI+f1p/+XQ936wHDEuxz9XuGvu07RRL6RscOTbIn78uKSmLKf5lnJrotHz+Ww
h5KoyQO0/fPf2bk8ld64fGgKfK1HyPZXRCCNYUGT9nE0ZKudTOyyD2ADUVjLC3Qs
1hy2d5O3lXf+H4HHlW1swqiYddPa4ejGzurbcxquK0ByKmtpO6c354LzOnX1tVP8
ngTgTo6R3qBhkLpdm4VZgJ51clnU8SJ/BEBola7IR4QmKvGQLoLU7R3wD8oHrnWQ
km8rBS6AuIazMppymDnX5DFodp7tGA2TVopXyx6vvaxk1SLv6N7KX5B9vjvlfli6
HsMhrWMtpyJ2DHhs3dOfaqZ/oeDbdFrCXVtINt2kptSV0jI8KPUVTABmsQeQPAI0
iOFmHJqXXbce4vYG4aReLvvq9YeRTjXQcuNcIwDyCY/YFbagTfQ=
=H4mf
-----END PGP SIGNATURE-----
Reply to: