Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2009.1247 Low: rgmanager security, bug fix, and enhancement update 3 September 2009 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: rgmanager Publisher: Red Hat Operating System: Red Hat Enterprise Linux Server 5 UNIX variants (UNIX, Linux, OSX) Impact/Access: Overwrite Arbitrary Files -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2008-6552 Reference: ESB-2009.1246 Original Bulletin: https://rhn.redhat.com/errata/RHSA-2009-1339.html Comment: This advisory references vulnerabilities in products which run on platforms other than Red Hat. It is recommended that administrators running rgmanager check for an updated version of the software for their operating system. - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Low: rgmanager security, bug fix, and enhancement update Advisory ID: RHSA-2009:1339-02 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2009-1339.html Issue date: 2009-09-02 CVE Names: CVE-2008-6552 ===================================================================== 1. Summary: An updated rgmanager package that fixes multiple security issues, various bugs, and adds enhancements is now available for Red Hat Enterprise Linux 5. This update has been rated as having low security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: RHEL Clustering (v. 5 server) - i386, ia64, ppc, x86_64 3. Description: The rgmanager package contains the Red Hat Resource Group Manager, which provides high availability for critical server applications in the event of system downtime. Multiple insecure temporary file use flaws were discovered in rgmanager and various resource scripts run by rgmanager. A local attacker could use these flaws to overwrite an arbitrary file writable by the rgmanager process (i.e. user root) with the output of rgmanager or a resource agent via a symbolic link attack. (CVE-2008-6552) This update also fixes the following bugs: * clulog now accepts '-' as the first character in messages. * if expire_time is 0, max_restarts is no longer ignored. * the SAP resource agents included in the rgmanager package shipped with Red Hat Enterprise Linux 5.3 were outdated. This update includes the most recent SAP resource agents and, consequently, improves SAP failover support. * empty PID files no longer cause resource start failures. * recovery policy of type 'restart' now works properly when using a resource based on ra-skelet.sh. * samba.sh has been updated to kill the PID listed in the proper PID file. * handling of the '-F' option has been improved to fix issues causing rgmanager to crash if no members of a restricted failover domain were online. * the number of simultaneous status checks can now be limited to prevent load spikes. * forking and cloning during status checks has been optimized to reduce load spikes. * rg_test no longer hangs when run with large cluster configuration files. * when rgmanager is used with a restricted failover domain it will no longer occasionally segfault when some nodes are offline during a failover event. * virtual machine guests no longer restart after a cluster.conf update. * nfsclient.sh no longer leaves temporary files after running. * extra checks from the Oracle agents have been removed. * vm.sh now uses libvirt. * users can now define an explicit service processing order when central_processing is enabled. * virtual machine guests can no longer start on 2 nodes at the same time. * in some cases a successfully migrated virtual machine guest could restart when the cluster.conf file was updated. * incorrect reporting of a service being started when it was not started has been addressed. As well, this update adds the following enhancements: * a startup_wait option has been added to the MySQL resource agent. * services can now be prioritized. * rgmanager now checks to see if it has been killed by the OOM killer and if so, reboots the node. Users of rgmanager are advised to upgrade to this updated package, which resolves these issues and adds these enhancements. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 250718 - fs.sh inefficient scripting leads to load peaks and disk saturation 412911 - Convert all XM management calls to either lib virt or virsh 449394 - Recovery policy of type restart doesn't work with a service using a resource based on ra-skelet.sh 468691 - Virtual Services guest can start on 2 nodes at same time 470917 - The oracledb.sh script checks in strange intervals(10s, 5m, 4.5m) 471066 - rgmanager oracledb.sh resource agent does not properly check for all db startup failures. 471226 - oracledb.sh script kills ALL oracle instances when failing over 471431 - second ocf_log message doesn't make it to /var/log/messages 474444 - Zero-length pid files cause resource start failures 475826 - Update support for SAP resource agents (rgmanager) 481058 - MySQL Service Startup Timeout after Crash 482858 - Cluster Event Script needs Updates to include Group Exclusive 483093 - rgmanager: samba.sh tries to kill the wrong pid file 486349 - nfsclient.sh leaves temporary files /tmp/nfsclient-status-cache-$$ 486717 - clusvcadm -e <service> -F handling bugs 488714 - Enabling (according to failover domain rules) a frozen service results in a unusable failed+frozen service 489785 - /usr/share/cluster/apache.sh does not handle a valid /etc/httpd/conf/httpd.conf configuration correctly 490449 - domU's restart after cluster.conf update 490455 - rg_test hangs when running against cluster 492828 - RFE: priorities for services/virtual machines 494977 - segfault in check_rdomain_crash() during failover 505340 - VM migration and subsequent cluster.conf update can cause the VM restart 514044 - vm.sh does will fail resource if "no state" is detected 519436 - CVE-2008-6552 cman, gfs2-utils, rgmanager: multiple insecure temporary file use issues 6. Package List: RHEL Clustering (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/rgmanager-2.0.52-1.el5.src.rpm i386: rgmanager-2.0.52-1.el5.i386.rpm rgmanager-debuginfo-2.0.52-1.el5.i386.rpm ia64: rgmanager-2.0.52-1.el5.ia64.rpm rgmanager-debuginfo-2.0.52-1.el5.ia64.rpm ppc: rgmanager-2.0.52-1.el5.ppc.rpm rgmanager-debuginfo-2.0.52-1.el5.ppc.rpm x86_64: rgmanager-2.0.52-1.el5.x86_64.rpm rgmanager-debuginfo-2.0.52-1.el5.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6552 http://www.redhat.com/security/updates/classification/#low 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://www.redhat.com/security/team/contact/ Copyright 2009 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFKniLIXlSAg2UNWIIRAlb4AJwIkJJHbOXlvjwOcbwjt70V0asv/wCeNBm+ xcb6vJWVqnC+4Fu+Rc5pXaw= =ohX8 - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 If you believe that your computer system has been compromised or attacked in any way, we encourage you to let us know by completing the secure National IT Incident Reporting Form at: http://www.auscert.org.au/render.html?it=3192 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iD8DBQFKnyQgNVH5XJJInbgRApHRAJ4tjfTRsaU430XryFaeYiULdXsBKgCaAr/0 V3DjdVQnhK06qShBwbn5VGQ= =iu9g -----END PGP SIGNATURE-----