The s3_token middleware in python-keystoneclient is vulnerable to man-in-the-middle attacks. This vulnerability is caused when python-keystoneclient disables certificate verification when the “insecure” option is set in a paste.ini file regardless of the value.
lists.openstack.org/pipermail/openstack-announce/2015-April/000350.html
rhn.redhat.com/errata/RHSA-2015-1677.html
rhn.redhat.com/errata/RHSA-2015-1685.html
www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
www.securityfocus.com/bid/74187
www.ubuntu.com/usn/USN-2705-1
access.redhat.com/errata/RHSA-2015:1677
access.redhat.com/errata/RHSA-2015:1685
access.redhat.com/security/cve/CVE-2015-1852
access.redhat.com/security/updates/classification/#moderate
bugs.launchpad.net/keystonemiddleware/+bug/1411063
bugzilla.redhat.com/show_bug.cgi?id=1209527
rhn.redhat.com/errata/RHSA-2015-1677.html