Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Date: Tue, 14 Apr 2015 16:04:05 -0400
From: Tristan Cacqueray <>
Subject: [OSSA 2015-007] S3Token TLS cert verification option not honored

OSSA-2015-007: S3Token TLS cert verification option not honored

:Date: April 14, 2015
:CVE: CVE-2015-1852

- python-keystoneclient: versions through 1.3.0
- keystonemiddleware: versions through 1.5.0

Brant Knudson from IBM reported a vulnerability in keystonemiddleware
(formerly shipped as python-keystoneclient). When the 'insecure'
option is set in a S3Token paste configuration file its value is
effectively ignored and instead assumed to be true. As a result
certificate verification will be disabled, leaving TLS connections
open to MITM attacks. Note that it's unusual to explicitly add this
option and then set it to false, so the impact of this bug is thought
to be limited. All versions of s3_token middleware with TLS settings
configured are affected by this flaw.

- (python-keystoneclient) (Icehouse)
- (keystonemiddleware)    (Juno)
- (python-keystoneclient) (Juno)
- (keystonemiddleware)    (Kilo)
- (python-keystoneclient) (Kilo)

- Brant Knudson from IBM (CVE-2015-1852)


- This fix will be included in keystonemiddleware 1.6.0 release and
  python-keystoneclient 1.4.0 release.

Tristan Cacqueray
OpenStack Vulnerability Management Team

Download attachment "signature.asc" of type "application/pgp-signature" (474 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.