Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Ppc64\-Diag
(Ppc64\-Diag_project)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 2 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2014-06-17 | CVE-2014-4039 | ppc64-diag 2.6.1 uses 0775 permissions for /tmp/diagSEsnap and does not properly restrict permissions for /tmp/diagSEsnap/snapH.tar.gz, which allows local users to obtain sensitive information by reading files in this archive, as demonstrated by /var/log/messages and /etc/yaboot.conf. | Ppc64\-Diag, Enterprise_linux_server, Linux_enterprise_server | N/A | ||
2014-06-17 | CVE-2014-4038 | ppc64-diag 2.6.1 allows local users to overwrite arbitrary files via a symlink attack related to (1) rtas_errd/diag_support.c and /tmp/get_dt_files, (2) scripts/ppc64_diag_mkrsrc and /tmp/diagSEsnap/snapH.tar.gz, or (3) lpd/test/lpd_ela_test.sh and /var/tmp/ras. | Ppc64\-Diag, Enterprise_linux_server, Linux_enterprise_server | N/A |