Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1073139 - (CVE-2014-8165) CVE-2014-8165 powerpc-utils-python: arbitrary code execution due to unpickling untrusted input
CVE-2014-8165 powerpc-utils-python: arbitrary code execution due to unpicklin...
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20140930,repor...
: Security
Depends On: 1073144 1190597
Blocks: 1042744 1075728 1323912
  Show dependency treegraph
 
Reported: 2014-03-05 16:20 EST by Vincent Danen
Modified: 2016-11-06 00:38 EDT (History)
11 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
It was found that the amsvis command of the powerpc-utils-python package did not verify unpickled data before processing it. This could allow an attacker who can connect to an amsvis server process (or cause an amsvis client process to connect to them) to execute arbitrary code as the user running the amsvis process.
Story Points: ---
Clone Of:
Environment:
Last Closed: 2016-11-06 00:38:26 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2016:2607 normal SHIPPED_LIVE Moderate: powerpc-utils-python security update 2016-11-03 08:13:52 EDT

  None (edit)
Description Vincent Danen 2014-03-05 16:20:19 EST
The amsvis command in the powerpc-utils-python package implements a client-server protocol to exchange Active Memory Sharing information, based on the Python cPickle serialization library.  This could allow an attacker who can connect to amsvis server process (or cause an amsvis client process to connect to them) to execute arbitrary code as the user running the amsvis process.  This update changes the client-server protocol to use JSON instead.

Acknowledgements:

This issue was discovered by Dhiru Kholia of Red Hat Product Security.
Comment 3 Florian Weimer 2015-02-06 04:36:18 EST
Public via: http://sourceforge.net/p/powerpc-utils/mailman/message/32884230/
Comment 4 Florian Weimer 2015-02-09 04:15:55 EST
Created powerpc-utils-python tracking bugs for this issue:

Affects: fedora-all [bug 1190597]
Comment 5 Florian Weimer 2015-03-16 12:37:41 EDT
Statement:

This issue affects the versions of powerpc-utils-python as shipped with Red Hat Enterprise Linux 7 for Power. Red Hat Product Security has rated this issue as having Moderate security impact. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.
Comment 12 errata-xmlrpc 2016-11-03 17:28:53 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2016:2607 https://rhn.redhat.com/errata/RHSA-2016-2607.html

Note You need to log in before you can comment on or make changes to this bug.