CWE
362 59
Advisory Published
CVE Published
Updated

CVE-2014-4038: Race Condition

First published: Fri Jun 13 2014(Updated: )

As noted in the SUSE bug report [1], numerous /tmp race conditions exist in ppc64-diag, in particular: rtas_errd/diag_support.c:233: char command[]="/usr/bin/find /proc/device-tree -name status -print &gt; /tmp/get_dt_files"; rtas_errd/diag_support.c:241: fp1 = fopen("/tmp/get_dt_files", "r"); rtas_errd/prrn_hotplug:8:TMPFILE=`mktemp -p /tmp` scripts/ppc64_diag_mkrsrc:126:mkdir "/tmp/diagSEsnap", 0775; scripts/ppc64_diag_mkrsrc:127:$general_eed_file = "/tmp/diagSEsnap/snapH.tar.gz"; In the case of rtas_errd/prrn_hotplug, mktemp is used but is assumed to have succeeded; there is no check for the return value. mktemp should probably be used properly in all of these. I don't know if the data in /tmp/diagSEsnap is sensitive or not, but if it is, the permissions on that directory should probably be tightened up. No CVE(s) have been assigned to these issues as of yet. [1] <a href="https://bugzilla.novell.com/show_bug.cgi?id=882667">https://bugzilla.novell.com/show_bug.cgi?id=882667</a>

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
SUSE Linux Enterprise Server=11-sp3
Ppc64-diag Project=2.6.1
Red Hat Enterprise Linux Server=6.0
Red Hat Enterprise Linux Server=7.0

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2014-4038?

    CVE-2014-4038 has a medium severity rating due to its potential for local privilege escalation.

  • How do I fix CVE-2014-4038?

    To mitigate CVE-2014-4038, update affected software to the latest versions that patch the race condition vulnerabilities.

  • What systems are affected by CVE-2014-4038?

    CVE-2014-4038 affects specific versions of SUSE Linux Enterprise Server and Red Hat Enterprise Linux.

  • What kind of vulnerability is CVE-2014-4038?

    CVE-2014-4038 is a local privilege escalation vulnerability caused by race conditions in the ppc64-diag software.

  • Is CVE-2014-4038 exploit related to file permissions?

    Yes, the exploit associated with CVE-2014-4038 typically involves manipulating temporary file permissions.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203