LWN.net Logo

Mageia alert MGASA-2013-0224 (python-suds)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2013-0224: Updated python-suds package fixes security vulnerability
Date:  Sun, 21 Jul 2013 11:25:12 +0200
Message-ID:  <20130721092512.70C4441D7C@valstar.mageia.org>
Archive-link:  Article, Thread

MGASA-2013-0224 - Updated python-suds package fixes security vulnerability Publication date: 21 Jul 2013 URL: http://advisories.mageia.org/MGASA-2013-0224.html Type: security Affected Mageia releases: 2, 3 CVE: CVE-2013-2217 Description: An insecure temporary directory use flaw was found in the way python-suds performed initialization of its internal file-based URL cache (predictable location was used for directory to store the cached files). A local attacker could use this flaw to conduct symbolic link attacks, possibly leading to their ability for example the SOAP .wsdl metadata to redirect queries to a different host, than originally intended (CVE-2013-2217). References: - https://bugs.mageia.org/show_bug.cgi?id=10791 - http://lists.opensuse.org/opensuse-updates/2013-07/msg000... - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2217 SRPMS: - 3/core/python-suds-0.4.1-3.1.mga3 - 2/core/python-suds-0.4.1-2.1.mga2


(Log in to post comments)

Copyright © 2013, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds