Safety vulnerability ID: 35372
The information on this page was manually curated by our Cybersecurity Intelligence Team.
OpenStack Object Storage (swift) before 1.7.0 uses the loads function in the pickle Python module unsafely when storing and loading metadata in memcached, which allows remote attackers to execute arbitrary code via a crafted pickle object.
Latest version: 2.35.0
OpenStack Object Storage
OpenStack Object Storage (swift) before 1.7.0 uses the loads function in the pickle Python module unsafely when storing and loading metadata in memcached, which allows remote attackers to execute arbitrary code via a crafted pickle object.
MLIST:[oss-security] 20120905 CVE-Request: openstack pickle de-serialization: http://www.openwall.com/lists/oss-security/2012/09/05/4
MLIST:[oss-security] 20120905 Re: CVE-Request: openstack pickle de-serialization: http://www.openwall.com/lists/oss-security/2012/09/05/16
MISC:https://bugzilla.redhat.com/show_bug.cgi?id=854757: https://bugzilla.redhat.com/show_bug.cgi?id=854757
CONFIRM:https://bugs.launchpad.net/swift/+bug/1006414: https://bugs.launchpad.net/swift/+bug/1006414
CONFIRM:https://github.com/openstack/swift/commit/e1ff51c04554d51616d2845f92ab726cb0e5831a: https://github.com/openstack/swift/commit/e1ff51c04554d51616d2845f92ab726cb0e5831a
CONFIRM:https://launchpad.net/swift/+milestone/1.7.0: https://launchpad.net/swift/+milestone/1.7.0
FEDORA:FEDORA-2012-15098: http://lists.fedoraproject.org/pipermail/package-announce/2012-October/089472.html
REDHAT:RHSA-2012:1379: http://rhn.redhat.com/errata/RHSA-2012-1379.html
REDHAT:RHSA-2013:0691: http://rhn.redhat.com/errata/RHSA-2013-0691.html
BID:55420: http://www.securityfocus.com/bid/55420
XF:openstack-swift-loads-code-exec(79140): https://exchange.xforce.ibmcloud.com/vulnerabilities/79140
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application