Link Following The advisory has been revoked - it doesn't affect any version of package ppc64-diag  (opens in a new tab)


Threat Intelligence

EPSS
0.04% (5th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UBUNTU1404-PPC64DIAG-630985
  • published10 Sept 2020
  • disclosed17 Jun 2014

Introduced: 17 Jun 2014

CVE-2014-4038  (opens in a new tab)
CWE-59  (opens in a new tab)

Amendment

The Ubuntu security team deemed this advisory irrelevant for Ubuntu:14.04.

NVD Description

Note: Versions mentioned in the description apply only to the upstream ppc64-diag package and not the ppc64-diag package as distributed by Ubuntu.

ppc64-diag 2.6.1 allows local users to overwrite arbitrary files via a symlink attack related to (1) rtas_errd/diag_support.c and /tmp/get_dt_files, (2) scripts/ppc64_diag_mkrsrc and /tmp/diagSEsnap/snapH.tar.gz, or (3) lpd/test/lpd_ela_test.sh and /var/tmp/ras.