First published: Tue Dec 10 2019(Updated: )
python-keystoneclient version 0.2.3 to 0.2.5 has middleware memcache signing bypass
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/python-keystoneclient | >=0.2.3<=0.2.5 | 0.3.0 |
Openstack Python-keystoneclient | >=0.2.3<=0.2.5 | |
Redhat Openstack | =3.0 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
debian/python-keystoneclient | 1:4.1.1-2 1:5.0.1-3 1:5.5.0-2 | |
>=0.2.3<=0.2.5 | ||
=3.0 | ||
=8.0 | ||
=9.0 | ||
=10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2013-2167 is critical with a score of 9.8.
python-keystoneclient version 0.2.3 to 0.2.5 is affected by CVE-2013-2167.
To fix CVE-2013-2167, upgrade python-keystoneclient to version 0.3.0 or higher.
Yes, you can find references for CVE-2013-2167 at the following links: [NVD](https://nvd.nist.gov/vuln/detail/CVE-2013-2167), [GitHub](https://github.com/openstack/python-keystoneclient/commit/eeefb784f24c37d5f56a421e1ccc911cace9385e), [RedHat](https://access.redhat.com/security/cve/cve-2013-2167).
The Common Weakness Enumeration (CWE) for CVE-2013-2167 is CWE-345.