Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Mon, 28 Nov 2011 08:18:41 -0700
From: Kurt Seifried <>
CC: Jan Lieskovsky <>,
        "Steven M. Christey" <>
Subject: Re: CVE Request -- python-celery / Celery v2.4 --
 Privilege escalation due improper sanitization of --uid and --gid arguments
 in certain tools (CELERYSA-0001

On 11/28/2011 02:09 AM, Jan Lieskovsky wrote:
> Hello Kurt, Steve, vendors,
>   a privilege escalation flaw was found in the way 'celeryd-multi',
> 'celeryd_detach', 'celerybeat' and 'celeryev' tools of the Celery,
> an asynchronous task queue based on distributed message passing,
> performed sanitization of --uid and --gid arguments, provided to
> the tools on the command line (only effective user id was changed,
> with the real one remaining unchanged). A local attacker could use
> this flaw to send messages via the message broker or use the Pickle
> serializer to load and execute arbitrary code with elevated privileges.
> References:
> [1]
> [2]
> [3]
> [4]
> Relevant upstream patch:
> [5]
> Could you allocate a CVE id for this issue?
> Thank you && Regards, Jan.
> -- 
> Jan iankko Lieskovsky / Red Hat Security Response Team
Please use CVE-2011-4356 for this issue.


-Kurt Seifried / Red Hat Security Response Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.