First published: Fri Nov 01 2019(Updated: )
HTTPSConnections in OpenStack Keystone 2013, OpenStack Compute 2013.1, and possibly other OpenStack components, fail to validate server-side SSL certificates.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenStack Compute | =2013.1 | |
OpenStack Keystone | =2013 | |
Redhat Openstack | =3.0 | |
Redhat Openstack | =4.0 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
pip/keystone | <8.0.0a0 | 8.0.0a0 |
pip/neutron | <7.0.0a0 | 7.0.0a0 |
pip/cinder | <7.0.0a0 | 7.0.0a0 |
pip/python-keystoneclient | <0.4.0 | 0.4.0 |
debian/keystone | 2:18.0.0-3+deb11u1 2:22.0.0-2 2:25.0.0-2 | |
debian/swift | 2.26.0-10+deb11u1 2.30.0-4 2.33.0-7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2013-2255.
The severity level of CVE-2013-2255 is medium with a severity value of 5.9.
CVE-2013-2255 affects OpenStack Keystone 2013, OpenStack Compute 2013.1, and possibly other OpenStack components.
To fix this vulnerability in Keystone, update to version 2:14.2.0-0+deb10u1, 2:18.0.0-3+deb11u1, 2:22.0.0-2, or 2:24.0.0-1. For Swift, update to version 2.19.1-1, 2.19.1-1+deb10u1, 2.26.0-10+deb11u1, 2.30.0-4, or 2.32.0-2.
More information about CVE-2013-2255 can be found at the following references: [Access Red Hat](https://access.redhat.com/security/cve/cve-2013-2255), [Launchpad](https://bugs.launchpad.net/ossn/+bug/1188189), and [Bugzilla Red Hat](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-2255).