Summary: | <sys-cluster/swift-1.7.6-r3: Unchecked user input in Swift XML responses (CVE-2013-2161) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | trivial | CC: | prometheanfire |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.openwall.com/lists/oss-security/2013/06/13/4 | ||
Whiteboard: | ~4 [noglsa] | ||
Package list: | Runtime testing required: | --- |
Description
Agostino Sarubbo
2013-06-16 13:38:50 UTC
already fixed Is there anything to do here? I don't think this bug should be open, but since I'm not on the sec team I don't want to close this myself... (In reply to Matthew Thode ( prometheanfire ) from comment #2) > Is there anything to do here? Yes, fill in the rest of the bug report. > I don't think this bug should be open, Not anymore. > but since I'm not on the sec team I don't want to close this myself... We don't mind the help :D Closing noglsa for ~arch only. CVE-2013-2161 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2161): XML injection vulnerability in account/utils.py in OpenStack Swift Folsom, Grizzly, and Havana allows attackers to trigger invalid or spoofed Swift responses via an account name. |