{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"important"},"category":"csaf_vex","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"SUSE CVE-2021-3563","title":"Title"},{"category":"description","text":"A flaw was found in openstack-keystone. Only the first 72 characters of an application secret are verified allowing attackers bypass some password complexity which administrators may be counting on. The highest threat from this vulnerability is to data confidentiality and integrity.","title":"Description of the CVE"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"CVE-2021-3563","url":"https://www.suse.com/security/cve/CVE-2021-3563"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 1186380 for CVE-2021-3563","url":"https://bugzilla.suse.com/1186380"}],"title":"SUSE CVE CVE-2021-3563","tracking":{"current_release_date":"2025-02-17T05:57:32Z","generator":{"date":"2023-02-15T03:49:08Z","engine":{"name":"cve-database.git:bin/generate-csaf-vex.pl","version":"1"}},"id":"CVE-2021-3563","initial_release_date":"2023-02-15T03:49:08Z","revision_history":[{"date":"2023-02-15T03:49:08Z","number":"2","summary":"Current version"},{"date":"2025-01-01T04:57:06Z","number":"3","summary":"Current version"},{"date":"2025-02-15T05:32:12Z","number":"4","summary":"Current version"},{"date":"2025-02-17T05:57:32Z","number":"5","summary":"Current version"}],"status":"interim","version":"5"}}}