{"id":"MGASA-2013-0224","summary":"Updated python-suds package fixes security vulnerability","details":"An insecure temporary directory use flaw was found in the way python-suds\nperformed initialization of its internal file-based URL cache (predictable\nlocation was used for directory to store the cached files). A local attacker\ncould use this flaw to conduct symbolic link attacks, possibly leading to\ntheir ability for example the SOAP .wsdl metadata to redirect queries to a\ndifferent host, than originally intended (CVE-2013-2217).\n","modified":"2026-02-04T02:37:42.963187Z","published":"2013-07-21T09:25:10Z","related":["CVE-2013-2217"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2013-0224.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=10791"},{"type":"REPORT","url":"http://lists.opensuse.org/opensuse-updates/2013-07/msg00062.html"}],"affected":[{"package":{"name":"python-suds","ecosystem":"Mageia:2","purl":"pkg:rpm/mageia/python-suds?arch=source&distro=mageia-2"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.4.1-2.1.mga2"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2013-0224.json"}},{"package":{"name":"python-suds","ecosystem":"Mageia:3","purl":"pkg:rpm/mageia/python-suds?arch=source&distro=mageia-3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.4.1-3.1.mga3"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2013-0224.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}