Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/swift@2.35.1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/swift@2.35.1-0%2Bdeb13u1?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (13)
Vulnerability Summary Aliases
VCID-1k44-tzfw-pkhw OpenStack Object Storage (Swift) allows remote attackers to cause a denial of service A memory-leak issue was found in OpenStack Object Storage (swift), in the client-to-proxy connection. An OpenStack-authenticated attacker could remotely trigger this flaw to cause denial of service through excess memory consumption. CVE-2016-0737
GHSA-972c-cfv8-2hq8
VCID-4djj-fd3y-jqch The TempURL middleware in OpenStack Object Storage (Swift) 1.4.6 through 1.8.0, 1.9.0 through 1.10.0, and 1.11.0 allows remote attackers to obtain secret URLs by leveraging an object name and a timing side-channel attack. CVE-2014-0006
GHSA-cf9m-q836-vf26
PYSEC-2014-116
VCID-4k1g-3b3h-1fbz Temporary urls leaked via logging In OpenStack Swift prior to 2.15.2, the proxy-server logs full tempurl paths, potentially leaking reusable tempurl signatures to anyone with read access to these logs. All Swift deployments using the tempurl middleware are affected. CVE-2017-8761
GHSA-8fxc-qm65-vpxg
VCID-4wxz-pgew-5uc4 OpenStack Object Storage (Swift) allows remote attackers to cause a denial of service OpenStack Object Storage (Swift) before 2.3.1 (Kilo), 2.4.x, and 2.5.x before 2.5.1 (Liberty) do not properly close server connections, which allows remote attackers to cause a denial of service (proxy-server resource consumption) via a series of interrupted requests to a Large Object URL. CVE-2016-0738
GHSA-fxwr-2vxm-cg7p
VCID-9sad-598q-vygc several CVE-2013-4155
GHSA-wxx2-gqvv-34hx
VCID-akvp-y5s1-x7eg OpenStack Swift Cross-site Scriping vulnerability Cross-site scripting (XSS) vulnerability in OpenStack Swift 1.11.0 through 1.13.1 allows remote attackers to inject arbitrary web script or HTML via the WWW-Authenticate header. CVE-2014-3497
GHSA-66vj-393f-hxfv
VCID-cczb-m9jq-wbb2 OpenStack Swift Unauthorized delete of versioned Swift object OpenStack Object Storage (Swift) before 2.3.0, when allow_version is configured, allows remote authenticated users to delete the latest version of an object by leveraging listing access to the x-versions-location container. CVE-2015-1856
GHSA-cc77-5vw4-7pwg
VCID-njnr-ngu6-7qdv OpenStack Swift Unchecked user input in XML responses XML injection vulnerability in account/utils.py in OpenStack Swift Folsom, Grizzly, and Havana allows attackers to trigger invalid or spoofed Swift responses via an account name. CVE-2013-2161
GHSA-9xgv-6v35-mmcj
VCID-qsxb-qjb1-mqfd OpenStack Swift XML external entities (XXE) Injection An issue was discovered in OpenStack Swift before 2.28.1, 2.29.x before 2.29.2, and 2.30.0. By supplying crafted XML files, an authenticated user may coerce the S3 API into returning arbitrary file contents from the host server, resulting in unauthorized read access to potentially sensitive data. This impacts both s3api deployments (Rocky or later), and swift3 deployments (Queens and earlier, no longer actively developed). CVE-2022-47950
GHSA-274c-rx2j-2v3x
VCID-uexc-7rt7-hbgx OpenStack Keystone and other components vulnerable to Improper Certificate Validation HTTPSConnections in OpenStack Keystone 2013, OpenStack Compute 2013.1, and possibly other OpenStack components, fail to validate server-side SSL certificates. CVE-2013-2255
GHSA-qh2x-hpf9-cf2g
VCID-wf91-36ce-hbcz OpenStack Object Storage (swift) Code Injection vulnerability OpenStack Object Storage (swift) before 1.7.0 uses the loads function in the pickle Python module unsafely when storing and loading metadata in memcached, which allows remote attackers to execute arbitrary code via a crafted pickle object. CVE-2012-4406
GHSA-v7mh-3jgf-r26c
VCID-y2t3-3pyp-tbd2 OpenStack Swift metadata constraints are not correctly enforced OpenStack Object Storage (Swift) before 2.2.0 allows remote authenticated users to bypass the max_meta_count and other metadata constraints via multiple crafted requests which exceed the limit when combined. CVE-2014-7960
GHSA-g6x3-55qv-x6p2
VCID-yhkc-dkqq-x7fg Exposure of Sensitive Information to an Unauthorized Actor OpenStack Object Storage (Swift) before 2.4.0 allows attackers to obtain sensitive information via a PUT tempurl and a DLO object manifest that references an object in another container. CVE-2015-5223
GHSA-q45h-chc8-hvp6

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T13:16:15.456204+00:00 Debian Importer Fixing VCID-uexc-7rt7-hbgx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:01:50.436770+00:00 Debian Importer Fixing VCID-yhkc-dkqq-x7fg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:54:46.357714+00:00 Debian Importer Fixing VCID-cczb-m9jq-wbb2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:51:12.311152+00:00 Debian Importer Fixing VCID-qsxb-qjb1-mqfd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:13:21.136729+00:00 Debian Importer Fixing VCID-y2t3-3pyp-tbd2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:27:31.563832+00:00 Debian Importer Fixing VCID-akvp-y5s1-x7eg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:13:02.577833+00:00 Debian Importer Fixing VCID-wf91-36ce-hbcz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:32:02.852836+00:00 Debian Importer Fixing VCID-njnr-ngu6-7qdv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:35:13.044638+00:00 Debian Importer Fixing VCID-4djj-fd3y-jqch https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:33:50.963855+00:00 Debian Importer Fixing VCID-1k44-tzfw-pkhw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:24:51.516777+00:00 Debian Importer Fixing VCID-9sad-598q-vygc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:08:55.893421+00:00 Debian Importer Fixing VCID-4k1g-3b3h-1fbz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:47:42.022211+00:00 Debian Importer Fixing VCID-4wxz-pgew-5uc4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T09:08:21.132784+00:00 Debian Importer Fixing VCID-uexc-7rt7-hbgx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:57:22.672265+00:00 Debian Importer Fixing VCID-yhkc-dkqq-x7fg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:51:56.472278+00:00 Debian Importer Fixing VCID-cczb-m9jq-wbb2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:49:17.134005+00:00 Debian Importer Fixing VCID-qsxb-qjb1-mqfd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:21:39.377399+00:00 Debian Importer Fixing VCID-y2t3-3pyp-tbd2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:48:28.607312+00:00 Debian Importer Fixing VCID-akvp-y5s1-x7eg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:37:35.104255+00:00 Debian Importer Fixing VCID-wf91-36ce-hbcz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:06:39.267960+00:00 Debian Importer Fixing VCID-njnr-ngu6-7qdv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:23:09.204945+00:00 Debian Importer Fixing VCID-4djj-fd3y-jqch https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:22:24.095426+00:00 Debian Importer Fixing VCID-1k44-tzfw-pkhw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:16:59.500676+00:00 Debian Importer Fixing VCID-9sad-598q-vygc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:07:31.900693+00:00 Debian Importer Fixing VCID-4k1g-3b3h-1fbz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:54:32.989148+00:00 Debian Importer Fixing VCID-4wxz-pgew-5uc4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:53:40.567315+00:00 Debian Importer Fixing VCID-qsxb-qjb1-mqfd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:53:40.517206+00:00 Debian Importer Fixing VCID-4k1g-3b3h-1fbz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:53:40.475246+00:00 Debian Importer Fixing VCID-4wxz-pgew-5uc4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:53:40.425729+00:00 Debian Importer Fixing VCID-1k44-tzfw-pkhw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:53:40.384566+00:00 Debian Importer Fixing VCID-yhkc-dkqq-x7fg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:53:40.335003+00:00 Debian Importer Fixing VCID-cczb-m9jq-wbb2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:53:40.284943+00:00 Debian Importer Fixing VCID-y2t3-3pyp-tbd2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:53:40.242371+00:00 Debian Importer Fixing VCID-akvp-y5s1-x7eg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:53:40.191523+00:00 Debian Importer Fixing VCID-4djj-fd3y-jqch https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:53:40.140835+00:00 Debian Importer Fixing VCID-9sad-598q-vygc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:53:40.090038+00:00 Debian Importer Fixing VCID-uexc-7rt7-hbgx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:53:40.047336+00:00 Debian Importer Fixing VCID-njnr-ngu6-7qdv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:53:39.997058+00:00 Debian Importer Fixing VCID-wf91-36ce-hbcz https://security-tracker.debian.org/tracker/data/json 38.1.0