SUSE-SU-2015:1141-1: moderate: Security update for python-keystoneclient
sle-security-updates at lists.suse.com
sle-security-updates at lists.suse.com
Thu Jun 25 07:05:02 MDT 2015
SUSE Security Update: Security update for python-keystoneclient
______________________________________________________________________________
Announcement ID: SUSE-SU-2015:1141-1
Rating: moderate
References: #897103 #928205
Cross-References: CVE-2014-7144 CVE-2015-1852
Affected Products:
SUSE Cloud 4
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
python-keystoneclient was updated to fix two security issues:
* bsc#928205: S3Token TLS certificate verification option not honored.
(CVE-2015-1852)
* bsc#897103: TLS certificate verification option not honored in paste
configs. (CVE-2014-7144)
Security Issues:
* CVE-2014-7144
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7144>
* CVE-2015-1852
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1852>
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Cloud 4:
zypper in -t patch sleclo40sp3-python-keystoneclient=10667
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Cloud 4 (x86_64):
python-keystoneclient-0.9.0-0.13.1
python-keystoneclient-doc-0.9.0-0.13.1
References:
https://www.suse.com/security/cve/CVE-2014-7144.html
https://www.suse.com/security/cve/CVE-2015-1852.html
https://bugzilla.suse.com/897103
https://bugzilla.suse.com/928205
https://download.suse.com/patch/finder/?keywords=4714a8b59432e065411eb4fa1f784f01
More information about the sle-security-updates
mailing list