Hi Thomas,

(only replying for the version information, haven't looked at the actual 
issues):

On Thu, Sep 25, 2014 at 03:28:41PM +0800, Thomas Goirand wrote:
> On 09/25/2014 05:34 AM, Luciano Bello wrote:
> > Package: python-keystoneclient
> > Severity: important
> > Tags: security upstream patch fixed-upstream
> > 
> > Hi there,
> >     the following vulnerabilities were published for python-keystoneclient:
> > 
> > CVE-2014-7144: TLS cert verification option not honored in paste configs
> > 
> > If you fix the vulnerabilities please also make sure to include the
> > CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
> > 
> > For further information see:
> > http://seclists.org/oss-sec/2014/q3/620
> > https://review.openstack.org/#/c/113191/
> > 
> > Please adjust the affected versions in the BTS as needed. Can you please 
> > confirm 
> > to the security-team if the stable version is affected?
> > 
> > Regards, luciano
> 
> Hi Luciano,
> 
> You've send twice the same bug report, using the same CVE, but for both
> keystonemiddleware and keystoneclient. Is this intentional?
> 
> CVE-2014-7144 is about keystonemiddleware. Stable isn't affected (it
> doesn't contain keystonemiddleware). Though if there's another CVE which
> I'm not (yet) aware of on keystoneclient, then this would have to be
> checked.

This is accordign to the upstream advisory at
http://www.openwall.com/lists/oss-security/2014/09/17/3

Versions: versions up to 1.1.1 (keystonemiddleware), versions up to 0.10.1
(python-keystoneclient)

Does this holds also for python-keystoneclient in Debian?

Regards,
Salvatore


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to