First published: Tue Sep 01 2015(Updated: )
A flaw was found in the way swiftonfile (gluster-swift) serializes and stores metadata on disk by using Python's pickle module (<a href="https://docs.python.org/2/library/pickle.html">https://docs.python.org/2/library/pickle.html</a>). Exploiting this flaw causes remote code execution of arbitrary code on the storage node.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
GlusterFS | =3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5242 is rated as critical as it allows for remote code execution due to improper serialization of metadata.
To fix CVE-2015-5242, upgrade to a version of Red Hat Gluster Storage that has patched this vulnerability, preferably 3.1 and above.
CVE-2015-5242 affects Red Hat Gluster Storage version 3.1.
CVE-2015-5242 is a remote code execution vulnerability due to a flaw in the serialization of metadata using Python's pickle module.
Yes, CVE-2015-5242 can be exploited remotely, allowing attackers to execute arbitrary code on affected systems.