SUSE-SU-2015:1141-1: moderate: Security update for python-keystoneclient

sle-security-updates at lists.suse.com sle-security-updates at lists.suse.com
Thu Jun 25 07:05:02 MDT 2015


   SUSE Security Update: Security update for python-keystoneclient
______________________________________________________________________________

Announcement ID:    SUSE-SU-2015:1141-1
Rating:             moderate
References:         #897103 #928205 
Cross-References:   CVE-2014-7144 CVE-2015-1852
Affected Products:
                    SUSE Cloud 4
______________________________________________________________________________

   An update that fixes two vulnerabilities is now available.

Description:


   python-keystoneclient was updated to fix two security issues:

       * bsc#928205: S3Token TLS certificate verification option not honored.
         (CVE-2015-1852)
       * bsc#897103: TLS certificate verification option not honored in paste
         configs. (CVE-2014-7144)

   Security Issues:

       * CVE-2014-7144
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7144>
       * CVE-2015-1852
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1852>


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Cloud 4:

      zypper in -t patch sleclo40sp3-python-keystoneclient=10667

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Cloud 4 (x86_64):

      python-keystoneclient-0.9.0-0.13.1
      python-keystoneclient-doc-0.9.0-0.13.1


References:

   https://www.suse.com/security/cve/CVE-2014-7144.html
   https://www.suse.com/security/cve/CVE-2015-1852.html
   https://bugzilla.suse.com/897103
   https://bugzilla.suse.com/928205
   https://download.suse.com/patch/finder/?keywords=4714a8b59432e065411eb4fa1f784f01



More information about the sle-security-updates mailing list