Search for packages
| purl | pkg:deb/debian/swift@2.2.0-1%2Bdeb8u1 |
| Next non-vulnerable version | 2.26.0-10+deb11u1 |
| Latest non-vulnerable version | 2.26.0-10+deb11u1 |
| Risk | 4.0 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-1k44-tzfw-pkhw
Aliases: CVE-2016-0737 GHSA-972c-cfv8-2hq8 |
OpenStack Object Storage (Swift) allows remote attackers to cause a denial of service A memory-leak issue was found in OpenStack Object Storage (swift), in the client-to-proxy connection. An OpenStack-authenticated attacker could remotely trigger this flaw to cause denial of service through excess memory consumption. |
Affected by 2 other vulnerabilities. |
|
VCID-4k1g-3b3h-1fbz
Aliases: CVE-2017-8761 GHSA-8fxc-qm65-vpxg |
Temporary urls leaked via logging In OpenStack Swift prior to 2.15.2, the proxy-server logs full tempurl paths, potentially leaking reusable tempurl signatures to anyone with read access to these logs. All Swift deployments using the tempurl middleware are affected. |
Affected by 1 other vulnerability. |
|
VCID-4wxz-pgew-5uc4
Aliases: CVE-2016-0738 GHSA-fxwr-2vxm-cg7p |
OpenStack Object Storage (Swift) allows remote attackers to cause a denial of service OpenStack Object Storage (Swift) before 2.3.1 (Kilo), 2.4.x, and 2.5.x before 2.5.1 (Liberty) do not properly close server connections, which allows remote attackers to cause a denial of service (proxy-server resource consumption) via a series of interrupted requests to a Large Object URL. |
Affected by 2 other vulnerabilities. |
|
VCID-cczb-m9jq-wbb2
Aliases: CVE-2015-1856 GHSA-cc77-5vw4-7pwg |
OpenStack Swift Unauthorized delete of versioned Swift object OpenStack Object Storage (Swift) before 2.3.0, when allow_version is configured, allows remote authenticated users to delete the latest version of an object by leveraging listing access to the x-versions-location container. |
Affected by 2 other vulnerabilities. |
|
VCID-qsxb-qjb1-mqfd
Aliases: CVE-2022-47950 GHSA-274c-rx2j-2v3x |
OpenStack Swift XML external entities (XXE) Injection An issue was discovered in OpenStack Swift before 2.28.1, 2.29.x before 2.29.2, and 2.30.0. By supplying crafted XML files, an authenticated user may coerce the S3 API into returning arbitrary file contents from the host server, resulting in unauthorized read access to potentially sensitive data. This impacts both s3api deployments (Rocky or later), and swift3 deployments (Queens and earlier, no longer actively developed). |
Affected by 0 other vulnerabilities. |
|
VCID-yhkc-dkqq-x7fg
Aliases: CVE-2015-5223 GHSA-q45h-chc8-hvp6 |
Exposure of Sensitive Information to an Unauthorized Actor OpenStack Object Storage (Swift) before 2.4.0 allows attackers to obtain sensitive information via a PUT tempurl and a DLO object manifest that references an object in another container. |
Affected by 2 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||