====================================================================                   Red Hat Security Advisory

Synopsis:          Low: rgmanager security and bug fix update
Advisory ID:       RHSA-2011:0264-01
Product:           Red Hat Cluster Suite
Advisory URL:      https://access.redhat.com/errata/RHSA-2011:0264.html
Issue date:        2011-02-16
CVE Names:         CVE-2008-6552 CVE-2010-3389 
====================================================================
1. Summary:

An updated rgmanager package that fixes multiple security issues and
several bugs is now available for Red Hat Cluster Suite 4.

The Red Hat Security Response Team has rated this update as having low
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

2. Relevant releases/architectures:

Red Hat Cluster Suite 4AS - i386, ia64, ppc, x86_64
Red Hat Cluster Suite 4ES - i386, ia64, x86_64
Red Hat Cluster Suite 4WS - i386, ia64, x86_64

3. Description:

The rgmanager package contains the Red Hat Resource Group Manager, which
provides high availability for critical server applications.

Multiple insecure temporary file use flaws were discovered in rgmanager and
various resource scripts run by rgmanager. A local attacker could use these
flaws to overwrite an arbitrary file writable by the rgmanager process
(i.e. user root) with the output of rgmanager or a resource agent via a
symbolic link attack. (CVE-2008-6552)

It was discovered that certain resource agent scripts set the
LD_LIBRARY_PATH environment variable to an insecure value containing empty
path elements. A local user able to trick a user running those scripts to
run them while working from an attacker-writable directory could use this
flaw to escalate their privileges via a specially-crafted dynamic library.
(CVE-2010-3389)

Red Hat would like to thank Raphael Geissert for reporting the
CVE-2010-3389 issue.

This update also fixes the following bugs:

* Previously, starting threads could incorrectly include a reference to an
exited thread if that thread exited when rgmanager received a request
to start a new thread. Due to this issue, the new thread did not retry and
entered an infinite loop. This update ensures that new threads do not
reference old threads. Now, new threads no longer enter an infinite loop
in which the rgmanager enables and disables services without failing
gracefully. (BZ#502872)

* Previously, nfsclient.sh left temporary nfsclient-status-cache-$$ files
in /tmp/. (BZ#506152)

* Previously, the function local_node_name in
/resources/utils/member_util.sh did not correctly check whether magma_tool
failed. Due to this issue, empty strings could be returned. This update
checks the input and rejects empty strings. (BZ#516758)

* Previously, the file system agent could kill a process when an
application used a mount point with a similar name to a mount point managed
by rgmanager using force_unmount. With this update, the file system agent
kills only the processes that access the mount point managed by rgmanager.
(BZ#555901)

* Previously, simultaneous execution of "lvchange --deltag" from
/etc/init.d/rgmanager caused a checksum error on High Availability Logical
Volume Manager (HA-LVM). With this update, ownership of LVM tags is checked
before removing them. (BZ#559582)

* Previously, the isAlive check could fail if two nodes used the same file
name. With this update, the isAlive function prevents two nodes from using
the same file name. (BZ#469815)

* Previously, the S/Lang code could lead to unwanted S/Lang stack leaks
during event processing. (BZ#507430)

All users of rgmanager are advised to upgrade to this updated package,
which corrects these issues.

4. Solution:

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at

5. Bugs fixed (http://bugzilla.redhat.com/):

469815 - clurgmgrd[15993]:  status on clusterfs "gfs" returned 1 (generic error)
498985 - rgmanager is affected by several symlink attack vulnerabilities
506152 - nfsclient.sh leaves temporary files /tmp/nfsclient-status-cache-$$
507430 - S/Lang stack / memory leaks
516758 - rgmanager:  local_node_name does not check if magma_tool failed.
519436 - CVE-2008-6552 cman, gfs2-utils, rgmanager: multiple insecure temporary file use issues
555901 - fs.sh can kill processes that are not on the mount point which is being unmounted
639044 - CVE-2010-3389 rgmanager: insecure library loading vulnerability

6. Package List:

Red Hat Cluster Suite 4AS:

Source:

i386:
rgmanager-1.9.88-2.el4.i386.rpm
rgmanager-debuginfo-1.9.88-2.el4.i386.rpm

ia64:
rgmanager-1.9.88-2.el4.ia64.rpm
rgmanager-debuginfo-1.9.88-2.el4.ia64.rpm

ppc:
rgmanager-1.9.88-2.el4.ppc64.rpm
rgmanager-debuginfo-1.9.88-2.el4.ppc64.rpm

x86_64:
rgmanager-1.9.88-2.el4.x86_64.rpm
rgmanager-debuginfo-1.9.88-2.el4.x86_64.rpm

Red Hat Cluster Suite 4ES:

Source:

i386:
rgmanager-1.9.88-2.el4.i386.rpm
rgmanager-debuginfo-1.9.88-2.el4.i386.rpm

ia64:
rgmanager-1.9.88-2.el4.ia64.rpm
rgmanager-debuginfo-1.9.88-2.el4.ia64.rpm

x86_64:
rgmanager-1.9.88-2.el4.x86_64.rpm
rgmanager-debuginfo-1.9.88-2.el4.x86_64.rpm

Red Hat Cluster Suite 4WS:

Source:

i386:
rgmanager-1.9.88-2.el4.i386.rpm
rgmanager-debuginfo-1.9.88-2.el4.i386.rpm

ia64:
rgmanager-1.9.88-2.el4.ia64.rpm
rgmanager-debuginfo-1.9.88-2.el4.ia64.rpm

x86_64:
rgmanager-1.9.88-2.el4.x86_64.rpm
rgmanager-debuginfo-1.9.88-2.el4.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/#package

7. References:

https://www.redhat.com/security/data/cve/CVE-2008-6552.html
https://www.redhat.com/security/data/cve/CVE-2010-3389.html
https://access.redhat.com/security/updates/classification/#low

8. Contact:

The Red Hat security contact is .  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2011 Red Hat, Inc.

Red Hat: 2011:0264-01: rgmanager: Low Advisory

An updated rgmanager package that fixes multiple security issues and several bugs is now available for Red Hat Cluster Suite 4

Summary

The rgmanager package contains the Red Hat Resource Group Manager, which provides high availability for critical server applications.
Multiple insecure temporary file use flaws were discovered in rgmanager and various resource scripts run by rgmanager. A local attacker could use these flaws to overwrite an arbitrary file writable by the rgmanager process (i.e. user root) with the output of rgmanager or a resource agent via a symbolic link attack. (CVE-2008-6552)
It was discovered that certain resource agent scripts set the LD_LIBRARY_PATH environment variable to an insecure value containing empty path elements. A local user able to trick a user running those scripts to run them while working from an attacker-writable directory could use this flaw to escalate their privileges via a specially-crafted dynamic library. (CVE-2010-3389)
Red Hat would like to thank Raphael Geissert for reporting the CVE-2010-3389 issue.
This update also fixes the following bugs:
* Previously, starting threads could incorrectly include a reference to an exited thread if that thread exited when rgmanager received a request to start a new thread. Due to this issue, the new thread did not retry and entered an infinite loop. This update ensures that new threads do not reference old threads. Now, new threads no longer enter an infinite loop in which the rgmanager enables and disables services without failing gracefully. (BZ#502872)
* Previously, nfsclient.sh left temporary nfsclient-status-cache-$$ files in /tmp/. (BZ#506152)
* Previously, the function local_node_name in /resources/utils/member_util.sh did not correctly check whether magma_tool failed. Due to this issue, empty strings could be returned. This update checks the input and rejects empty strings. (BZ#516758)
* Previously, the file system agent could kill a process when an application used a mount point with a similar name to a mount point managed by rgmanager using force_unmount. With this update, the file system agent kills only the processes that access the mount point managed by rgmanager. (BZ#555901)
* Previously, simultaneous execution of "lvchange --deltag" from /etc/init.d/rgmanager caused a checksum error on High Availability Logical Volume Manager (HA-LVM). With this update, ownership of LVM tags is checked before removing them. (BZ#559582)
* Previously, the isAlive check could fail if two nodes used the same file name. With this update, the isAlive function prevents two nodes from using the same file name. (BZ#469815)
* Previously, the S/Lang code could lead to unwanted S/Lang stack leaks during event processing. (BZ#507430)
All users of rgmanager are advised to upgrade to this updated package, which corrects these issues.



Summary


Solution

Before applying this update, make sure all previously-released errata relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at

References

https://www.redhat.com/security/data/cve/CVE-2008-6552.html https://www.redhat.com/security/data/cve/CVE-2010-3389.html https://access.redhat.com/security/updates/classification/#low

Package List

Red Hat Cluster Suite 4AS:
Source:
i386: rgmanager-1.9.88-2.el4.i386.rpm rgmanager-debuginfo-1.9.88-2.el4.i386.rpm
ia64: rgmanager-1.9.88-2.el4.ia64.rpm rgmanager-debuginfo-1.9.88-2.el4.ia64.rpm
ppc: rgmanager-1.9.88-2.el4.ppc64.rpm rgmanager-debuginfo-1.9.88-2.el4.ppc64.rpm
x86_64: rgmanager-1.9.88-2.el4.x86_64.rpm rgmanager-debuginfo-1.9.88-2.el4.x86_64.rpm
Red Hat Cluster Suite 4ES:
Source:
i386: rgmanager-1.9.88-2.el4.i386.rpm rgmanager-debuginfo-1.9.88-2.el4.i386.rpm
ia64: rgmanager-1.9.88-2.el4.ia64.rpm rgmanager-debuginfo-1.9.88-2.el4.ia64.rpm
x86_64: rgmanager-1.9.88-2.el4.x86_64.rpm rgmanager-debuginfo-1.9.88-2.el4.x86_64.rpm
Red Hat Cluster Suite 4WS:
Source:
i386: rgmanager-1.9.88-2.el4.i386.rpm rgmanager-debuginfo-1.9.88-2.el4.i386.rpm
ia64: rgmanager-1.9.88-2.el4.ia64.rpm rgmanager-debuginfo-1.9.88-2.el4.ia64.rpm
x86_64: rgmanager-1.9.88-2.el4.x86_64.rpm rgmanager-debuginfo-1.9.88-2.el4.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package


Severity
Advisory ID: RHSA-2011:0264-01
Product: Red Hat Cluster Suite
Advisory URL: https://access.redhat.com/errata/RHSA-2011:0264.html
Issued Date: : 2011-02-16
CVE Names: CVE-2008-6552 CVE-2010-3389

Topic

An updated rgmanager package that fixes multiple security issues andseveral bugs is now available for Red Hat Cluster Suite 4.The Red Hat Security Response Team has rated this update as having lowsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,which give detailed severity ratings, are available for each vulnerabilityfrom the CVE links in the References section.


Topic


 

Relevant Releases Architectures

Red Hat Cluster Suite 4AS - i386, ia64, ppc, x86_64

Red Hat Cluster Suite 4ES - i386, ia64, x86_64

Red Hat Cluster Suite 4WS - i386, ia64, x86_64


Bugs Fixed

469815 - clurgmgrd[15993]: status on clusterfs "gfs" returned 1 (generic error)

498985 - rgmanager is affected by several symlink attack vulnerabilities

506152 - nfsclient.sh leaves temporary files /tmp/nfsclient-status-cache-$$

507430 - S/Lang stack / memory leaks

516758 - rgmanager: local_node_name does not check if magma_tool failed.

519436 - CVE-2008-6552 cman, gfs2-utils, rgmanager: multiple insecure temporary file use issues

555901 - fs.sh can kill processes that are not on the mount point which is being unmounted

639044 - CVE-2010-3389 rgmanager: insecure library loading vulnerability


Related News