Bug 2115122 (CVE-2022-2996) - CVE-2022-2996 python-scciclient: missing server certificate verification
Summary: CVE-2022-2996 python-scciclient: missing server certificate verification
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2022-2996
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2121556 2119227 2119228 2129243
Blocks: 2111223
TreeView+ depends on / blocked
 
Reported: 2022-08-03 21:53 UTC by Anten Skrabec
Modified: 2023-01-27 22:52 UTC (History)
17 users (show)

Fixed In Version: python-scciclient 0.12.0
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in the python-scciclient when making an HTTPS connection to a server where the server's certificate would not be verified. This issue opens up the connection to possible Man-in-the-middle (MITM) attacks.
Clone Of:
Environment:
Last Closed: 2023-01-27 22:52:13 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2022:8854 0 None None None 2022-12-07 19:25:47 UTC
Red Hat Product Errata RHSA-2022:8868 0 None None None 2022-12-07 20:27:04 UTC
Red Hat Product Errata RHSA-2023:0276 0 None None None 2023-01-25 12:29:55 UTC

Description Anten Skrabec 2022-08-03 21:53:03 UTC
A flaw was found in python-scciclient when making a HTTPS connection to a server where the server's certificate would not be verified.

https://opendev.org/x/python-scciclient/commit/274dca0344b65b4ac113d3271d21c17e970a636c

Comment 3 Mike Burns 2022-08-25 12:35:58 UTC
Is there a reason this is embargoed?  The link in the summary seems to be disclosing the issue?

https://opendev.org/x/python-scciclient/commit/274dca0344b65b4ac113d3271d21c17e970a636c

Comment 4 Mike Burns 2022-08-25 15:23:21 UTC
(In reply to Mike Burns from comment #3)
> Is there a reason this is embargoed?  The link in the summary seems to be
> disclosing the issue?
> 
> https://opendev.org/x/python-scciclient/commit/
> 274dca0344b65b4ac113d3271d21c17e970a636c

Also, is there a CVE number being assigned to this?

Comment 5 Anten Skrabec 2022-08-25 19:15:55 UTC
In reply to comment #4:
> (In reply to Mike Burns from comment #3)
> > Is there a reason this is embargoed?  The link in the summary seems to be
> > disclosing the issue?
> > 
> > https://opendev.org/x/python-scciclient/commit/
> > 274dca0344b65b4ac113d3271d21c17e970a636c
> 
> Also, is there a CVE number being assigned to this?

yup! CVE-2022-2996 has been assigned.

Comment 6 Anten Skrabec 2022-08-25 19:17:32 UTC
In reply to comment #3:
> Is there a reason this is embargoed?  The link in the summary seems to be
> disclosing the issue?
> 
> https://opendev.org/x/python-scciclient/commit/
> 274dca0344b65b4ac113d3271d21c17e970a636c

This was embargoed as when it was originally reported by Fujitsu, they wanted to handled privately. Ill go ahead and unembargo it now.

Comment 7 Anten Skrabec 2022-08-25 19:19:19 UTC
Created python-scciclient tracking bugs for this issue:

Affects: openstack-rdo [bug 2121556]

Comment 9 errata-xmlrpc 2022-12-07 19:25:45 UTC
This issue has been addressed in the following products:

  Red Hat OpenStack Platform 16.2

Via RHSA-2022:8854 https://access.redhat.com/errata/RHSA-2022:8854

Comment 10 errata-xmlrpc 2022-12-07 20:27:02 UTC
This issue has been addressed in the following products:

  Red Hat OpenStack Platform 16.1

Via RHSA-2022:8868 https://access.redhat.com/errata/RHSA-2022:8868

Comment 11 errata-xmlrpc 2023-01-25 12:29:53 UTC
This issue has been addressed in the following products:

  Red Hat OpenStack Platform 17.0

Via RHSA-2023:0276 https://access.redhat.com/errata/RHSA-2023:0276

Comment 12 Product Security DevOps Team 2023-01-27 22:52:11 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2022-2996


Note You need to log in before you can comment on or make changes to this bug.