keystone/middleware/auth_token.py in OpenStack Nova Folsom, Grizzly, and Havana uses an insecure temporary directory for storing signing certificates, which allows local users to spoof servers by pre-creating this directory, which is reused by Nova, as demonstrated using /tmp/keystone-signing-nova on Fedora.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2013-0024 | keystone/middleware/auth_token.py in OpenStack Nova Folsom, Grizzly, and Havana uses an insecure temporary directory for storing signing certificates, which allows local users to spoof servers by pre-creating this directory, which is reused by Nova, as demonstrated using /tmp/keystone-signing-nova on Fedora. |
![]() |
GHSA-pxxv-rv32-2qgv | OpenStack Nova uses insecure keystone middleware tmpdir by default |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T15:20:37.504Z
Reserved: 2013-02-19T00:00:00
Link: CVE-2013-2030

No data.

Status : Deferred
Published: 2013-12-27T01:55:05.237
Modified: 2025-04-11T00:51:21.963
Link: CVE-2013-2030


No data.