First published: Thu May 20 2021(Updated: )
A flaw was found in openstack-keystone, only the first 72 characters of an application secret are verified allowing attackers bypass some password complexity which administrators may be counting on. The highest threat from this vulnerability is to data confidentiality and integrity. A [patch](https://opendev.org/openstack/keystone/commit/7859ed26003858ebfd9a5e866b43f1a6a9e83dca) is available.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenStack Keystone | ||
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
Redhat Openstack Platform | =10.0 | |
Redhat Openstack Platform | =13.0 | |
Redhat Openstack Platform | =16.1 | |
Redhat Openstack Platform | =16.2 | |
pip/keystone | <=21.0.0 | |
debian/keystone | <=2:18.0.0-3+deb11u1<=2:22.0.0-2 | 2:25.0.0-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-3563 is high with a severity value of 7.4.
The highest threat from CVE-2021-3563 is to data confidentiality and integrity.
The affected software versions of CVE-2021-3563 include keystone version 2:14.2.0-0+deb10u1, 2:18.0.0-3+deb11u1, 2:22.0.0-2, and 2:24.0.0-1 in Debian Debian Linux version 10.0 and 11.0, as well as Redhat Openstack Platform versions 10.0, 13.0, 16.1, and 16.2.
There is currently no available fix or remedy for CVE-2021-3563. It is recommended to follow the official advisories and monitor for updates from the software vendor.
You can find more information about CVE-2021-3563 from the following references: [https://bugs.launchpad.net/keystone/+bug/1901891](https://bugs.launchpad.net/keystone/+bug/1901891), [https://bugzilla.redhat.com/show_bug.cgi?id=1962908](https://bugzilla.redhat.com/show_bug.cgi?id=1962908), [https://security-tracker.debian.org/tracker/CVE-2021-3563](https://security-tracker.debian.org/tracker/CVE-2021-3563)