-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2009.1247
         Low: rgmanager security, bug fix, and enhancement update
                             3 September 2009

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           rgmanager
Publisher:         Red Hat
Operating System:  Red Hat Enterprise Linux Server 5
                   UNIX variants (UNIX, Linux, OSX)
Impact/Access:     Overwrite Arbitrary Files -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2008-6552  

Reference:         ESB-2009.1246

Original Bulletin: 
   https://rhn.redhat.com/errata/RHSA-2009-1339.html

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than Red Hat. It is recommended that administrators
         running rgmanager check for an updated version of the software for 
         their operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Low: rgmanager security, bug fix, and enhancement update
Advisory ID:       RHSA-2009:1339-02
Product:           Red Hat Enterprise Linux
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2009-1339.html
Issue date:        2009-09-02
CVE Names:         CVE-2008-6552 
=====================================================================

1. Summary:

An updated rgmanager package that fixes multiple security issues, various
bugs, and adds enhancements is now available for Red Hat Enterprise Linux
5.

This update has been rated as having low security impact by the Red Hat
Security Response Team.

2. Relevant releases/architectures:

RHEL Clustering (v. 5 server) - i386, ia64, ppc, x86_64

3. Description:

The rgmanager package contains the Red Hat Resource Group Manager, which
provides high availability for critical server applications in the event of
system downtime.

Multiple insecure temporary file use flaws were discovered in rgmanager and
various resource scripts run by rgmanager. A local attacker could use these
flaws to overwrite an arbitrary file writable by the rgmanager process
(i.e. user root) with the output of rgmanager or a resource agent via a
symbolic link attack. (CVE-2008-6552)

This update also fixes the following bugs:

* clulog now accepts '-' as the first character in messages.

* if expire_time is 0, max_restarts is no longer ignored.

* the SAP resource agents included in the rgmanager package shipped with
Red Hat Enterprise Linux 5.3 were outdated. This update includes the most
recent SAP resource agents and, consequently, improves SAP failover
support.

* empty PID files no longer cause resource start failures.

* recovery policy of type 'restart' now works properly when using a
resource based on ra-skelet.sh.

* samba.sh has been updated to kill the PID listed in the proper PID file.

* handling of the '-F' option has been improved to fix issues causing
rgmanager to crash if no members of a restricted failover domain were
online.

* the number of simultaneous status checks can now be limited to prevent
load spikes.

* forking and cloning during status checks has been optimized to reduce
load spikes.

* rg_test no longer hangs when run with large cluster configuration files.

* when rgmanager is used with a restricted failover domain it will no
longer occasionally segfault when some nodes are offline during a failover
event.

* virtual machine guests no longer restart after a cluster.conf update.

* nfsclient.sh no longer leaves temporary files after running.

* extra checks from the Oracle agents have been removed.

* vm.sh now uses libvirt.

* users can now define an explicit service processing order when
central_processing is enabled.

* virtual machine guests can no longer start on 2 nodes at the same time.

* in some cases a successfully migrated virtual machine guest could restart
when the cluster.conf file was updated.

* incorrect reporting of a service being started when it was not started
has been addressed.

As well, this update adds the following enhancements:

* a startup_wait option has been added to the MySQL resource agent.

* services can now be prioritized.

* rgmanager now checks to see if it has been killed by the OOM killer and
if so, reboots the node.

Users of rgmanager are advised to upgrade to this updated package, which
resolves these issues and adds these enhancements.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network.  Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

5. Bugs fixed (http://bugzilla.redhat.com/):

250718 - fs.sh inefficient scripting leads to load peaks and disk saturation
412911 - Convert all XM management calls to either lib virt or virsh
449394 - Recovery policy of type restart doesn't work with a service using a resource based on ra-skelet.sh
468691 - Virtual Services guest can start on 2 nodes at same time
470917 - The oracledb.sh script checks in strange intervals(10s, 5m, 4.5m)
471066 - rgmanager oracledb.sh resource agent does not properly check for all db startup failures.
471226 - oracledb.sh script kills ALL oracle instances when failing over
471431 - second ocf_log message doesn't make it to /var/log/messages
474444 - Zero-length pid files cause resource start failures
475826 - Update support for SAP resource agents (rgmanager)
481058 - MySQL Service Startup Timeout after Crash
482858 - Cluster Event Script needs Updates to include Group Exclusive
483093 - rgmanager: samba.sh tries to kill the wrong pid file
486349 - nfsclient.sh leaves temporary files /tmp/nfsclient-status-cache-$$
486717 - clusvcadm -e <service> -F handling bugs
488714 - Enabling (according to failover domain rules) a frozen service results in a unusable failed+frozen service
489785 - /usr/share/cluster/apache.sh does not handle a valid /etc/httpd/conf/httpd.conf configuration correctly
490449 - domU's restart after cluster.conf update
490455 - rg_test hangs when running against cluster
492828 - RFE: priorities for services/virtual machines
494977 - segfault in check_rdomain_crash() during failover
505340 - VM migration and subsequent cluster.conf update can cause the VM restart
514044 - vm.sh does will fail resource if "no state" is detected
519436 - CVE-2008-6552 cman, gfs2-utils, rgmanager: multiple insecure temporary file use issues

6. Package List:

RHEL Clustering (v. 5 server):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/rgmanager-2.0.52-1.el5.src.rpm

i386:
rgmanager-2.0.52-1.el5.i386.rpm
rgmanager-debuginfo-2.0.52-1.el5.i386.rpm

ia64:
rgmanager-2.0.52-1.el5.ia64.rpm
rgmanager-debuginfo-2.0.52-1.el5.ia64.rpm

ppc:
rgmanager-2.0.52-1.el5.ppc.rpm
rgmanager-debuginfo-2.0.52-1.el5.ppc.rpm

x86_64:
rgmanager-2.0.52-1.el5.x86_64.rpm
rgmanager-debuginfo-2.0.52-1.el5.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6552
http://www.redhat.com/security/updates/classification/#low

8. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2009 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFKniLIXlSAg2UNWIIRAlb4AJwIkJJHbOXlvjwOcbwjt70V0asv/wCeNBm+
xcb6vJWVqnC+4Fu+Rc5pXaw=
=ohX8
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iD8DBQFKnyQgNVH5XJJInbgRApHRAJ4tjfTRsaU430XryFaeYiULdXsBKgCaAr/0
V3DjdVQnhK06qShBwbn5VGQ=
=iu9g
-----END PGP SIGNATURE-----