First published: Tue Feb 18 2014(Updated: )
The OpenStack Python client library for Swift (python-swiftclient) 1.0 through 1.9.0 does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/python-swiftclient | >=1.0<=1.9.0 | 2.0.2 |
OpenStack Swift | =1.0.0 | |
OpenStack Swift | =1.0.1 | |
OpenStack Swift | =1.0.2 | |
OpenStack Swift | =1.1.0 | |
OpenStack Swift | =1.1.0-rc1 | |
OpenStack Swift | =1.1.0-rc2 | |
OpenStack Swift | =1.2.0 | |
OpenStack Swift | =1.2.0-gamma1 | |
OpenStack Swift | =1.2.0-rc1 | |
OpenStack Swift | =1.3.0 | |
OpenStack Swift | =1.3.0-gamma1 | |
OpenStack Swift | =1.3.0-rc1 | |
OpenStack Swift | =1.4.0 | |
OpenStack Swift | =1.4.1 | |
OpenStack Swift | =1.4.2 | |
OpenStack Swift | =1.4.3 | |
OpenStack Swift | =1.4.4 | |
OpenStack Swift | =1.4.5 | |
OpenStack Swift | =1.4.6 | |
OpenStack Swift | =1.4.7 | |
OpenStack Swift | =1.4.8 | |
OpenStack Swift | =1.5.0 | |
OpenStack Swift | =1.6.0 | |
OpenStack Swift | =1.7.0 | |
OpenStack Swift | =1.7.2 | |
OpenStack Swift | =1.7.4 | |
OpenStack Swift | =1.7.5 | |
OpenStack Swift | =1.7.6 | |
OpenStack Swift | =1.8.0 | |
OpenStack Swift | =1.8.0-rc1 | |
OpenStack Swift | =1.8.0-rc2 | |
OpenStack Swift | =1.9.0 | |
OpenStack Swift | =1.10.0 | |
OpenStack Swift | =1.11.0 | |
pip/python-swiftclient | >=1.0<2.0.2 | 2.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.