CVE-2015-1852

NameCVE-2015-1852
DescriptionThe s3_token middleware in OpenStack keystonemiddleware before 1.6.0 and python-keystoneclient before 1.4.0 disables certification verification when the "insecure" option is set in a paste configuration (paste.ini) file regardless of the value, which allows remote attackers to conduct man-in-the-middle attacks via a crafted certificate, a different vulnerability than CVE-2014-7144.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs783164

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
python-keystoneclient (PTS)buster1:3.17.0-2fixed
bullseye1:4.1.1-2fixed
bookworm1:5.0.1-3fixed
sid, trixie1:5.2.0-2fixed
python-keystonemiddleware (PTS)buster5.2.0-2fixed
bullseye9.1.0-2fixed
bookworm10.1.0-4fixed
sid, trixie10.4.1-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
python-keystoneclientsourcewheezy(not affected)
python-keystoneclientsourcejessie1:0.10.1-2+deb8u1
python-keystoneclientsource(unstable)1:1.3.0-2783164
python-keystonemiddlewaresourcejessie1.0.0-3+deb8u1
python-keystonemiddlewaresource(unstable)1.5.0-2

Notes

originally fixed in 1:0.10.1-3 but then 1:1.3.0-1 was uploaded without the fix
[wheezy] - python-keystoneclient <not-affected> (s3_token middleware not present)
https://launchpad.net/bugs/1411063

Search for package or bug name: Reporting problems