{"id":"USN-3451-1","summary":"swift vulnerabilities","details":"It was discovered that OpenStack Swift incorrectly handled tempurls. A\nremote authenticated user in possession of a tempurl key authorized for PUT\ncould retrieve other objects in the same Swift account. (CVE-2015-5223)\n\nRomain Le Disez and Örjan Persson discovered that OpenStack Swift\nincorrectly closed client connections. A remote attacker could possibly use\nthis issue to consume resources, resulting in a denial of service.\n(CVE-2016-0737, CVE-2016-0738)\n","modified":"2026-02-10T04:41:13Z","published":"2017-10-11T12:01:33Z","related":["UBUNTU-CVE-2015-5223","UBUNTU-CVE-2016-0737","UBUNTU-CVE-2016-0738"],"upstream":["CVE-2015-5223","CVE-2016-0737","CVE-2016-0738","UBUNTU-CVE-2015-5223","UBUNTU-CVE-2016-0737","UBUNTU-CVE-2016-0738"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3451-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-5223"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-0737"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-0738"}],"affected":[{"package":{"name":"swift","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/swift@1.13.1-0ubuntu1.5?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.13.1-0ubuntu1.5"}]}],"versions":["1.10.0~rc1-0ubuntu1","1.10.0-0ubuntu1","1.11.0-0ubuntu2","1.12.0-0ubuntu1","1.13.0-0ubuntu1","1.13.1~rc1-0ubuntu2","1.13.1~rc2-0ubuntu1","1.13.1-0ubuntu1","1.13.1-0ubuntu1.1","1.13.1-0ubuntu1.2","1.13.1-0ubuntu1.3"],"ecosystem_specific":{"binaries":[{"binary_version":"1.13.1-0ubuntu1.5","binary_name":"python-swift"},{"binary_version":"1.13.1-0ubuntu1.5","binary_name":"swift"},{"binary_version":"1.13.1-0ubuntu1.5","binary_name":"swift-account"},{"binary_version":"1.13.1-0ubuntu1.5","binary_name":"swift-container"},{"binary_version":"1.13.1-0ubuntu1.5","binary_name":"swift-object"},{"binary_version":"1.13.1-0ubuntu1.5","binary_name":"swift-object-expirer"},{"binary_version":"1.13.1-0ubuntu1.5","binary_name":"swift-proxy"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3451-1.json","cves_map":{"cves":[{"id":"CVE-2015-5223","severity":[{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-0737","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2016-0738","severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:14.04:LTS"}}}],"schema_version":"1.7.3"}