OpenStack Keystone before 2012.1.1, as used in OpenStack Folsom before Folsom-1 and OpenStack Essex, does not properly implement token expiration, which allows remote authenticated users to bypass intended authorization restrictions by (1) creating new tokens through token chaining, (2) leveraging possession of a token for a disabled user account, or (3) leveraging possession of a token for an account with a changed password.
https://launchpad.net/keystone/essex/2012.1.1/+download/keystone-2012.1.1.tar.gz
https://bugs.launchpad.net/keystone/+bug/998185
https://bugs.launchpad.net/keystone/+bug/997194
https://bugs.launchpad.net/keystone/+bug/996595
http://www.ubuntu.com/usn/USN-1552-1
http://www.openwall.com/lists/oss-security/2012/07/27/4
http://secunia.com/advisories/50494
http://secunia.com/advisories/50045
http://github.com/openstack/keystone/commit/d9600434da14976463a0bd03abd8e0309f0db454
http://github.com/openstack/keystone/commit/a67b24878a6156eab17b9098fa649f0279256f5d
http://github.com/openstack/keystone/commit/375838cfceb88cacc312ff6564e64eb18ee6a355
http://github.com/openstack/keystone/commit/29e74e73a6e51cffc0371b32354558391826a4aa