Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2013-6396

Published: 18 February 2014

The OpenStack Python client library for Swift (python-swiftclient) 1.0 through 1.9.0 does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

Notes

AuthorNote
mdeslaur
OSSA 2014-005
jdstrand
certificate verification checks are completely missing. Patch is
intrusive and may not be applied to 13.10. Patch adds an --insecure option
that would have to be enabled by default in the security update so as not to
break production systems. Depending on upstream's decision, Ubuntu may only
fix 14.04.
mdeslaur
fixed in 2.0

Priority

Low

Status

Package Release Status
python-swiftclient
Launchpad, Ubuntu, Debian
lucid Does not exist

precise Does not exist

quantal Not vulnerable
(code-not-present)
raring Not vulnerable
(code-not-present)
saucy Ignored
(end of life)
trusty Does not exist
(trusty was not-affected [1:2.0.3-0ubuntu1])
upstream Needs triage