Bug 1073139 (CVE-2014-8165) - CVE-2014-8165 powerpc-utils-python: arbitrary code execution due to unpickling untrusted input
Summary: CVE-2014-8165 powerpc-utils-python: arbitrary code execution due to unpicklin...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2014-8165
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1073144 1190597
Blocks: 1042744 1075728 1323912
TreeView+ depends on / blocked
 
Reported: 2014-03-05 21:20 UTC by Vincent Danen
Modified: 2023-05-12 02:41 UTC (History)
11 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2016-11-06 04:38:26 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2016:2607 0 normal SHIPPED_LIVE Moderate: powerpc-utils-python security update 2016-11-03 12:13:52 UTC

Description Vincent Danen 2014-03-05 21:20:19 UTC
The amsvis command in the powerpc-utils-python package implements a client-server protocol to exchange Active Memory Sharing information, based on the Python cPickle serialization library.  This could allow an attacker who can connect to amsvis server process (or cause an amsvis client process to connect to them) to execute arbitrary code as the user running the amsvis process.  This update changes the client-server protocol to use JSON instead.

Acknowledgements:

This issue was discovered by Dhiru Kholia of Red Hat Product Security.

Comment 3 Florian Weimer 2015-02-06 09:36:18 UTC
Public via: http://sourceforge.net/p/powerpc-utils/mailman/message/32884230/

Comment 4 Florian Weimer 2015-02-09 09:15:55 UTC
Created powerpc-utils-python tracking bugs for this issue:

Affects: fedora-all [bug 1190597]

Comment 5 Florian Weimer 2015-03-16 16:37:41 UTC
Statement:

This issue affects the versions of powerpc-utils-python as shipped with Red Hat Enterprise Linux 7 for Power. Red Hat Product Security has rated this issue as having Moderate security impact. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.

Comment 12 errata-xmlrpc 2016-11-03 21:28:53 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2016:2607 https://rhn.redhat.com/errata/RHSA-2016-2607.html


Note You need to log in before you can comment on or make changes to this bug.