CVE-2015-1852
Published: 17 April 2015
The s3_token middleware in OpenStack keystonemiddleware before 1.6.0 and python-keystoneclient before 1.4.0 disables certification verification when the "insecure" option is set in a paste configuration (paste.ini) file regardless of the value, which allows remote attackers to conduct man-in-the-middle attacks via a crafted certificate, a different vulnerability than CVE-2014-7144.
Notes
Author | Note |
---|---|
mdeslaur | will not be fixed before 14.10 goes EoL |
Priority
Status
Package | Release | Status |
---|---|---|
python-keystoneclient Launchpad, Ubuntu, Debian |
lucid |
Does not exist
|
precise |
Not vulnerable
(code not present)
|
|
trusty |
Released
(1:0.7.1-ubuntu1.2)
|
|
upstream |
Needs triage
|
|
utopic |
Ignored
(end of life)
|
|
vivid |
Released
(1:1.2.0-0ubuntu1.1)
|
|
Patches: upstream: https://review.openstack.org/173378 upstream: https://review.openstack.org/173377 upstream: https://review.openstack.org/173370 |
||
python-keystonemiddleware Launchpad, Ubuntu, Debian |
lucid |
Does not exist
|
precise |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Needs triage
|
|
utopic |
Ignored
(end of life)
|
|
vivid |
Released
(1.5.0-0ubuntu1.1)
|
|
Patches: upstream: https://review.openstack.org/173376 upstream: https://review.openstack.org/173365 |