Bug 1134676 (CVE-2014-0485)

Summary: CVE-2014-0485 s3ql: code execution due to unsafe pickle() usage
Product: [Other] Security Response Reporter: Murray McAllister <mmcallis>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED UPSTREAM QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: i, maci
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-06-08 02:34:41 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1134677    
Bug Blocks:    
Attachments:
Description Flags
patch none

Description Murray McAllister 2014-08-28 05:02:58 UTC
It was reported that S3QL used the Python pickle() function in an unsafe way. A malicious storage back-end or man-in-the-middle attacker could use this flaw to execute arbitrary code.

Acknowledgements:

Red Hat would like to thank Nikolaus Rath for reporting this issue.

References:

https://www.debian.org/security/2014/dsa-3013

Comment 1 Murray McAllister 2014-08-28 05:04:18 UTC
Created attachment 931720 [details]
patch

Comment 2 Murray McAllister 2014-08-28 05:05:02 UTC
Created s3ql tracking bugs for this issue:

Affects: fedora-all [bug 1134677]

Comment 3 Murray McAllister 2014-08-28 06:32:12 UTC
Upstream commit:

https://bitbucket.org/nikratio/s3ql/commits/091ac263809b4e8

Comment 5 Product Security DevOps Team 2019-06-08 02:34:41 UTC
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.