| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| python-keystoneclient | pip | < 0.2.4 |
| 0.2.4 |
The vulnerability stemmed from missing expiration checks in PKI token validation logic. The bug report (Launchpad #1179615) explicitly references auth_token.py line 1047, and patches show expiration checks were added to the token validation flow. The AuthProtocol._get_token_info function in auth_token.py was identified as the primary location where PKI tokens were processed without proper expiry validation, as confirmed by the submitted patches and discussion in the bug tracker.
KEV Misses 88% of Exploited CVEs- Get the report