CVE-2022-2447
Publication date 1 September 2022
Last updated 11 December 2025
Ubuntu priority
Cvss 3 Severity Score
Description
A flaw was found in Keystone. There is a time lag (up to one hour in a default configuration) between when security policy says a token should be revoked from when it is actually revoked. This could allow a remote administrator to secretly maintain access for longer than expected.
Read the notes from the security team
Why is this CVE low priority?
Upstream keystone developers have rated this to be a low severity issue
Status
| Package | Ubuntu Release | Status |
|---|---|---|
| keystone | 25.10 questing |
Not affected
|
| 25.04 plucky |
Not affected
|
|
| 24.04 LTS noble |
Not affected
|
|
| 22.04 LTS jammy |
Fixed 2:21.0.1-0ubuntu2.1
|
|
| 20.04 LTS focal |
Vulnerable
|
|
| 18.04 LTS bionic |
Vulnerable
|
|
| 16.04 LTS xenial |
Vulnerable
|
|
| 14.04 LTS trusty | Ignored end of standard support |
Notes
Patch details
| Package | Patch details |
|---|---|
| keystone |
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score |
|
| Attack vector | Network |
| Attack complexity | High |
| Privileges required | High |
| User interaction | None |
| Scope | Unchanged |
| Confidentiality | High |
| Integrity impact | High |
| Availability impact | High |
| Vector | CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-7926-1
- OpenStack Keystone vulnerabilities
- 11 December 2025