OpenStack Object Storage (swift) before 1.7.0 uses the loads function in the pickle Python module unsafely when storing and loading metadata in memcached, which allows remote attackers to execute arbitrary code via a crafted pickle object.
The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Link | Tags |
---|---|
https://github.com/openstack/swift/commit/e1ff51c04554d51616d2845f92ab726cb0e5831a | patch |
http://www.securityfocus.com/bid/55420 | vdb entry broken link |
https://launchpad.net/swift/+milestone/1.7.0 | release notes |
http://rhn.redhat.com/errata/RHSA-2012-1379.html | third party advisory vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/79140 | vdb entry third party advisory |
https://bugs.launchpad.net/swift/+bug/1006414 | issue tracking patch |
https://bugzilla.redhat.com/show_bug.cgi?id=854757 | issue tracking patch |
http://www.openwall.com/lists/oss-security/2012/09/05/4 | mailing list |
http://lists.fedoraproject.org/pipermail/package-announce/2012-October/089472.html | mailing list vendor advisory |
http://rhn.redhat.com/errata/RHSA-2013-0691.html | not applicable vendor advisory |
http://www.openwall.com/lists/oss-security/2012/09/05/16 | mailing list |