Package: swift / 2.2.0-1+deb8u1
Metadata
Package | Version | Patches format |
---|---|---|
swift | 2.2.0-1+deb8u1 | 3.0 (quilt) |
Patch series
view the series filePatch | File delta | Description |
---|---|---|
CVE 2015 1856_Prevent unauthorized delete in versioned container.patch | (download) |
swift/proxy/controllers/obj.py |
12 8 + 4 - 0 ! |
cve-2015-1856: prevent unauthorized delete in versioned container An authenticated user can delete the most recent version of any versioned object who's name is known if the user has listing access to the x-versions-location container. Only Swift setups with allow_version setting are affected. . This patch closes this bug, tracked as CVE-2015-1856. |
CVE 2015 5223_Disallow unsafe tempurl operations to point to unauthorized data.patch | (download) |
swift/common/middleware/tempurl.py |
31 30 + 1 - 0 ! |
[patch] disallow unsafe tempurl operations to point to unauthorized data Do not allow PUT tempurls to create pointers to other data. Specifically disallow the creation of DLO object manifests by returning an error if a non-safe tempurl request includes an X-Object-Manifest header regardless of the value of the header. This prevents discoverability attacks which can use any PUT tempurl to probe for private data by creating a DLO object manifest and then using the PUT tempurl to head the object which would 404 if the prefix does not match any object data or form a valid DLO HEAD response if it does. This also prevents a tricky and potentially unexpected consequence of PUT tempurls which would make it unsafe to allow a user to download objects created by tempurl (even if they just created them) because the result of reading the object created via tempurl may not be the data which was uploaded. [CVE-2015-5223] Co-Authored-By: Kota Tsuyuzaki <tsuyuzaki.kota@lab.ntt.co.jp> Closes-Bug: 1453948 |
1