Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1209527 - (CVE-2015-1852) CVE-2015-1852 OpenStack keystonemiddleware/keystoneclient: S3Token TLS cert verification option not honored
CVE-2015-1852 OpenStack keystonemiddleware/keystoneclient: S3Token TLS cert v...
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20150415,repor...
: Security
Depends On: 1229487 1246330 1246331 1248326 1248327 1256638
Blocks: 1209529
  Show dependency treegraph
 
Reported: 2015-04-07 10:59 EDT by Vasyl Kaigorodov
Modified: 2016-04-26 09:45 EDT (History)
18 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
It was discovered that some items in the S3Token paste configuration as used by python-keystonemiddleware (formerly python-keystoneclient) were incorrectly evaluated as strings, an issue similar to CVE-2014-7144. If the "insecure" option were set to "false", the option would be evaluated as true, resulting in TLS connections being vulnerable to man-in-the-middle attacks. Note: the "insecure" option defaults to false, so setups that do not specifically define "insecure=false" are not affected.
Story Points: ---
Clone Of:
Environment:
Last Closed: 2015-08-25 03:21:40 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)
cve-2015-1852-master-keystoneclient.patch (3.23 KB, text/plain)
2015-04-10 06:10 EDT, Vasyl Kaigorodov
no flags Details
cve-2015-1852-master-keystonemiddleware.patch (3.19 KB, text/plain)
2015-04-10 06:10 EDT, Vasyl Kaigorodov
no flags Details


External Trackers
Tracker ID Priority Status Summary Last Updated
Launchpad 1411063 None None None Never
Red Hat Product Errata RHSA-2015:1677 normal SHIPPED_LIVE Moderate: python-keystoneclient and python-keystonemiddlware security update 2015-08-24 20:17:02 EDT
Red Hat Product Errata RHSA-2015:1685 normal SHIPPED_LIVE Moderate: python-keystoneclient security update 2015-08-25 05:44:02 EDT

  None (edit)
Description Vasyl Kaigorodov 2015-04-07 10:59:56 EDT
A vulnerability was discovered in OpenStack:

Title: S3Token TLS cert verification option not honored
Reporter: Brant Knudson (IBM)
Products: keystonemiddleware, python-keystoneclient
Affects: versions up to 1.5.0 (keystonemiddleware),
         versions up to 0.11.2 (python-keystoneclient)

Description:
Brant Knudson from IBM reported a vulnerability in keystonemiddleware
(formerly shipped as python-keystoneclient). When the 'insecure' option
is set in a S3Token paste configuration file its value is effectively
ignored and instead assumed to be true. As a result certificate
verification will be disabled, leaving TLS connections open to MITM
attacks. Note that it's unusual to explicitly add this option and then
set it to false, so the impact of this bug is thought to be limited. All
versions of s3_token middleware with TLS settings configured are
affected by this flaw.

Acknowledgements:

Red Hat would like to thank the OpenStack project for reporting this issue. Upstream acknowledges Brant Knudson from IBM as the original reporter.
Comment 1 Vasyl Kaigorodov 2015-04-10 06:10:18 EDT
Created attachment 1013072 [details]
cve-2015-1852-master-keystoneclient.patch
Comment 2 Vasyl Kaigorodov 2015-04-10 06:10:36 EDT
Created attachment 1013073 [details]
cve-2015-1852-master-keystonemiddleware.patch
Comment 3 Vasyl Kaigorodov 2015-04-10 06:54:15 EDT
Note that it's unusual to explicitly add this option and then
set it to false, so the impact of this bug is thought to be limited.
Comment 5 Fedora Update System 2015-07-18 21:59:08 EDT
python-keystonemiddleware-1.3.2-1.fc22 has been pushed to the Fedora 22 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 9 Garth Mollett 2015-08-23 23:16:46 EDT
Upstream advisory:

https://security.openstack.org/ossa/OSSA-2015-007.html
Comment 10 errata-xmlrpc 2015-08-24 16:17:40 EDT
This issue has been addressed in the following products:

  OpenStack 6 for RHEL 7

Via RHSA-2015:1677 https://rhn.redhat.com/errata/RHSA-2015-1677.html
Comment 11 errata-xmlrpc 2015-08-25 01:44:11 EDT
This issue has been addressed in the following products:

  OpenStack 5 for RHEL 7
  OpenStack 5 for RHEL 6

Via RHSA-2015:1685 https://rhn.redhat.com/errata/RHSA-2015-1685.html
Comment 12 Garth Mollett 2015-08-25 03:21:10 EDT
Created python-keystoneclient tracking bugs for this issue:

Affects: openstack-rdo [bug 1256638]

Note You need to log in before you can comment on or make changes to this bug.