Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2015-1852

Published: 17 April 2015

The s3_token middleware in OpenStack keystonemiddleware before 1.6.0 and python-keystoneclient before 1.4.0 disables certification verification when the "insecure" option is set in a paste configuration (paste.ini) file regardless of the value, which allows remote attackers to conduct man-in-the-middle attacks via a crafted certificate, a different vulnerability than CVE-2014-7144.

Notes

AuthorNote
mdeslaur
will not be fixed before 14.10 goes EoL

Priority

Medium

Status

Package Release Status
python-keystoneclient
Launchpad, Ubuntu, Debian
lucid Does not exist

precise Not vulnerable
(code not present)
trusty
Released (1:0.7.1-ubuntu1.2)
upstream Needs triage

utopic Ignored
(end of life)
vivid
Released (1:1.2.0-0ubuntu1.1)
Patches:
upstream: https://review.openstack.org/173378
upstream: https://review.openstack.org/173377
upstream: https://review.openstack.org/173370


python-keystonemiddleware
Launchpad, Ubuntu, Debian
lucid Does not exist

precise Does not exist

trusty Does not exist

upstream Needs triage

utopic Ignored
(end of life)
vivid
Released (1.5.0-0ubuntu1.1)
Patches:



upstream: https://review.openstack.org/173376
upstream: https://review.openstack.org/173365