CVE-2022-2447
Publication date 1 September 2022
Last updated 12 November 2025
Ubuntu priority
Cvss 3 Severity Score
Description
A flaw was found in Keystone. There is a time lag (up to one hour in a default configuration) between when security policy says a token should be revoked from when it is actually revoked. This could allow a remote administrator to secretly maintain access for longer than expected.
Read the notes from the security team
Why is this CVE low priority?
Upstream keystone developers have rated this to be a low severity issue
Status
| Package | Ubuntu Release | Status |
|---|---|---|
| keystone | 25.10 questing |
Not affected
|
| 25.04 plucky |
Not affected
|
|
| 24.04 LTS noble |
Not affected
|
|
| 22.04 LTS jammy |
Vulnerable
|
|
| 20.04 LTS focal |
Vulnerable
|
|
| 18.04 LTS bionic |
Vulnerable
|
|
| 16.04 LTS xenial |
Vulnerable
|
|
| 14.04 LTS trusty | Ignored end of standard support |
Notes
mdeslaur
fixed in 21.0.1, 22.0.1, 23.0.0.0rc1 fixed in (2:21.0.1-0ubuntu2) in jammy-updates, but not yet in -security
Patch details
| Package | Patch details |
|---|---|
| keystone |
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score |
|
| Attack vector | Network |
| Attack complexity | High |
| Privileges required | High |
| User interaction | None |
| Scope | Unchanged |
| Confidentiality | High |
| Integrity impact | High |
| Availability impact | High |
| Vector | CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H |