Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2015:0384 - Security Advisory
Issued:
2015-03-05
Updated:
2015-03-05

RHSA-2015:0384 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Low: powerpc-utils security, bug fix, and enhancement update

Type/Severity

Security Advisory: Low

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated powerpc-utils packages that fix one security issue, several bugs,
and add various enhancements are now available for Red Hat Enterprise
Linux 7.

Red Hat Product Security has rated this update as having Low security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in the
References section.

Description

The powerpc-utils packages provide various utilities for the PowerPC platform.

A flaw was found in the way the snap utility of powerpc-utils generated an
archive containing a configuration snapshot of a service. A local attacker could
obtain sensitive information from the generated archive such as plain text
passwords. (CVE-2014-4040)

The powerpc-utils packages have been upgraded to the upstream version 1.2.24,
which provides a number of bug fixes and enhancements over the previous version.
(BZ#1088539, BZ#1167865, BZ#1161552)

This update also fixes the following bugs:

  • Previously, the lsdevinfo command did not correctly process the path to the

device, which made the path unreadable in the console output of lsdevinfo. With
this update, lsdevinfo has been updated and the path is now displayed correctly.
(BZ#1079246)

  • Previously, after migrating several Linux partitions, Resource Monitoring and

Control (RMC) was inactive and Machine Type, Model, and Serial number (MTMS)
were set incorrectly, so the subsequent validation operation failed. This bug
has been fixed, and validation is now successful after migration and suspend.
(BZ#1083221)

  • Previously, when the drmgr tool attempted to remove the last CPU from the

system, drmgr became unresponsive or terminated unexpectedly. This bug has been
fixed, and drmgr no longer hangs or crashes in the described case. (BZ#1152313)

  • With this update, the drmgr utility has been fixed to correctly gather Logical

Memory Block (LMB) information while performing Mem Dynamic Logical Partitioning
(DLPAR) on little-endian varian of IBM Power Systems CPU architecture as
expected (BZ#1170856).

  • Previously, the "ppc64_cpu --threads-per-core" command returned incorrect data

with the --smt option enabled. This bug has been fixed and "ppc64_cpu

  • -threads-per-core" now reports correctly with enabled --smt. (BZ#1179263)

In addition, this update adds the following enhancements:

  • This update adds support for the Red Hat Enterprise Linux for POWER, little

endian CPU architecture to the powerpc-utils package. (BZ#1124006)

  • This update adds support for hot plugging of the qemu virtio device with the

drmgr command to the powerpc-utils package.(BZ#1083791)

  • The deprecated snap tool has been removed from the powerpc-utils packages. Its

functionality has been integrated into the sosreport tool. (BZ#1172087)

  • With this update, a dependency on the perl-Data-Dumper package required by the

rtas_dump utility has been added to powerpc-utils packages. (BZ#1175812)

Users of powerpc-utils are advised to upgrade to these updated packages, which
correct these issues and add these enhancements.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux for Power, big endian 7 ppc64
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.7 ppc64
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.6 ppc64
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.5 ppc64
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.4 ppc64
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.3 ppc64
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support for IBM Power, big endian 7 ppc64

Fixes

  • BZ - 1110520 - CVE-2014-4040 powerpc-utils: snap creates archives with fstab and yaboot.conf which may expose certain passwords

CVEs

  • CVE-2014-4040

References

  • https://access.redhat.com/security/updates/classification/#low
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for Power, big endian 7

SRPM
powerpc-utils-1.2.24-7.el7.src.rpm SHA-256: 981e85a71826516084e8c724007714c28ea1b773b1288b751a4cd9b010c3ab19
ppc64
powerpc-utils-1.2.24-7.el7.ppc64.rpm SHA-256: 76ae392f639bb68d5e3fce1eb3c1f1c55c9a833ecd387ab0fd2e4ed75d2a71de
powerpc-utils-debuginfo-1.2.24-7.el7.ppc64.rpm SHA-256: 53f5724c10664ee660c06212a9aabfb47e61dc340e7f8b7f7af5847ab1e7e98e

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.7

SRPM
powerpc-utils-1.2.24-7.el7.src.rpm SHA-256: 981e85a71826516084e8c724007714c28ea1b773b1288b751a4cd9b010c3ab19
ppc64
powerpc-utils-1.2.24-7.el7.ppc64.rpm SHA-256: 76ae392f639bb68d5e3fce1eb3c1f1c55c9a833ecd387ab0fd2e4ed75d2a71de
powerpc-utils-debuginfo-1.2.24-7.el7.ppc64.rpm SHA-256: 53f5724c10664ee660c06212a9aabfb47e61dc340e7f8b7f7af5847ab1e7e98e

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.6

SRPM
powerpc-utils-1.2.24-7.el7.src.rpm SHA-256: 981e85a71826516084e8c724007714c28ea1b773b1288b751a4cd9b010c3ab19
ppc64
powerpc-utils-1.2.24-7.el7.ppc64.rpm SHA-256: 76ae392f639bb68d5e3fce1eb3c1f1c55c9a833ecd387ab0fd2e4ed75d2a71de
powerpc-utils-debuginfo-1.2.24-7.el7.ppc64.rpm SHA-256: 53f5724c10664ee660c06212a9aabfb47e61dc340e7f8b7f7af5847ab1e7e98e

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.5

SRPM
powerpc-utils-1.2.24-7.el7.src.rpm SHA-256: 981e85a71826516084e8c724007714c28ea1b773b1288b751a4cd9b010c3ab19
ppc64
powerpc-utils-1.2.24-7.el7.ppc64.rpm SHA-256: 76ae392f639bb68d5e3fce1eb3c1f1c55c9a833ecd387ab0fd2e4ed75d2a71de
powerpc-utils-debuginfo-1.2.24-7.el7.ppc64.rpm SHA-256: 53f5724c10664ee660c06212a9aabfb47e61dc340e7f8b7f7af5847ab1e7e98e

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.4

SRPM
powerpc-utils-1.2.24-7.el7.src.rpm SHA-256: 981e85a71826516084e8c724007714c28ea1b773b1288b751a4cd9b010c3ab19
ppc64
powerpc-utils-1.2.24-7.el7.ppc64.rpm SHA-256: 76ae392f639bb68d5e3fce1eb3c1f1c55c9a833ecd387ab0fd2e4ed75d2a71de
powerpc-utils-debuginfo-1.2.24-7.el7.ppc64.rpm SHA-256: 53f5724c10664ee660c06212a9aabfb47e61dc340e7f8b7f7af5847ab1e7e98e

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.3

SRPM
powerpc-utils-1.2.24-7.el7.src.rpm SHA-256: 981e85a71826516084e8c724007714c28ea1b773b1288b751a4cd9b010c3ab19
ppc64
powerpc-utils-1.2.24-7.el7.ppc64.rpm SHA-256: 76ae392f639bb68d5e3fce1eb3c1f1c55c9a833ecd387ab0fd2e4ed75d2a71de
powerpc-utils-debuginfo-1.2.24-7.el7.ppc64.rpm SHA-256: 53f5724c10664ee660c06212a9aabfb47e61dc340e7f8b7f7af5847ab1e7e98e

Red Hat Enterprise Linux Server - Extended Life Cycle Support for IBM Power, big endian 7

SRPM
powerpc-utils-1.2.24-7.el7.src.rpm SHA-256: 981e85a71826516084e8c724007714c28ea1b773b1288b751a4cd9b010c3ab19
ppc64
powerpc-utils-1.2.24-7.el7.ppc64.rpm SHA-256: 76ae392f639bb68d5e3fce1eb3c1f1c55c9a833ecd387ab0fd2e4ed75d2a71de
powerpc-utils-debuginfo-1.2.24-7.el7.ppc64.rpm SHA-256: 53f5724c10664ee660c06212a9aabfb47e61dc340e7f8b7f7af5847ab1e7e98e

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility