CVE-2013-2167: Insufficient Verification of Data Authenticity
(updated )
python-keystoneclient version 0.2.3 to 0.2.5 has middleware memcache signing bypass
References
- lists.fedoraproject.org/pipermail/package-announce/2013-August/113944.html
- rhn.redhat.com/errata/RHSA-2013-0992.html
- www.openwall.com/lists/oss-security/2013/06/19/5
- www.securityfocus.com/bid/60680
- access.redhat.com/security/cve/cve-2013-2167
- bugs.gentoo.org/show_bug.cgi?id=CVE-2013-2167
- bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-2167
- exchange.xforce.ibmcloud.com/vulnerabilities/85492
- github.com/advisories/GHSA-9vg3-cf92-h2h7
- github.com/openstack/python-keystoneclient/commit/eeefb784f24c37d5f56a421e1ccc911cace9385e
- github.com/openstack/python-keystoneclient/commits/0.3.0
- nvd.nist.gov/vuln/detail/CVE-2013-2167
- security-tracker.debian.org/tracker/CVE-2013-2167
Detect and mitigate CVE-2013-2167 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →