| From: |
| Mageia Updates <buildsystem-daemon@mageia.org> |
| To: |
| updates-announce@ml.mageia.org |
| Subject: |
| [updates-announce] MGASA-2013-0224: Updated python-suds package
fixes security vulnerability |
| Date: |
| Sun, 21 Jul 2013 11:25:12 +0200 |
| Message-ID: |
| <20130721092512.70C4441D7C@valstar.mageia.org> |
| Archive-link: |
| Article, Thread
|
MGASA-2013-0224 - Updated python-suds package fixes security vulnerability
Publication date: 21 Jul 2013
URL: http://advisories.mageia.org/MGASA-2013-0224.html
Type: security
Affected Mageia releases: 2, 3
CVE: CVE-2013-2217
Description:
An insecure temporary directory use flaw was found in the way python-suds
performed initialization of its internal file-based URL cache (predictable
location was used for directory to store the cached files). A local attacker
could use this flaw to conduct symbolic link attacks, possibly leading to
their ability for example the SOAP .wsdl metadata to redirect queries to a
different host, than originally intended (CVE-2013-2217).
References:
- https://bugs.mageia.org/show_bug.cgi?id=10791
- http://lists.opensuse.org/opensuse-updates/2013-07/msg000...
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2217
SRPMS:
- 3/core/python-suds-0.4.1-3.1.mga3
- 2/core/python-suds-0.4.1-2.1.mga2
(
Log in to post comments)