Executive Summary
Summary | |
---|---|
Title | gfs2-utils security and bug fix update |
Informations | |||
---|---|---|---|
Name | RHSA-2009:1337 | First vendor Publication | 2009-09-02 |
Vendor | RedHat | Last vendor Modification | 2009-09-02 |
Severity (Vendor) | Low | Revision | 02 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:L/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 6.9 | Attack Range | Local |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 3.4 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Problem Description: An updated gfs2-utils package that fixes multiple security issues and various bugs is now available for Red Hat Enterprise Linux 5. This update has been rated as having low security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 3. Description: The gfs2-utils package provides the user-space tools necessary to mount, create, maintain, and test GFS2 file systems. Multiple insecure temporary file use flaws were discovered in GFS2 user level utilities. A local attacker could use these flaws to overwrite an arbitrary file writable by a victim running those utilities (typically root) with the output of the utilities via a symbolic link attack. (CVE-2008-6552) This update also fixes the following bugs: * gfs2_fsck now properly detects and repairs problems with sequence numbers on GFS2 file systems. * GFS2 user utilities now use the file system UUID. * gfs2_grow now properly updates the file system size during operation. * gfs2_fsck now returns the proper exit codes. * gfs2_convert now properly frees blocks when removing free blocks up to height 2. * the gfs2_fsck manual page has been renamed to fsck.gfs2 to match current standards. * the 'gfs2_tool df' command now provides human-readable output. * mounting GFS2 file systems with the noatime or noquota option now works properly. * new capabilities have been added to the gfs2_edit tool to help in testing and debugging GFS and GFS2 issues. * the 'gfs2_tool df' command no longer segfaults on file systems with a block size other than 4k. * the gfs2_grow manual page no longer references the '-r' option, which has been removed. * the 'gfs2_tool unfreeze' command no longer hangs during use. * gfs2_convert no longer corrupts file systems when converting from GFS to GFS2. * gfs2_fsck no longer segfaults when encountering a block which is listed as both a data and stuffed directory inode. * gfs2_fsck can now fix file systems even if the journal is already locked for use. * a GFS2 file system's metadata is now properly copied with 'gfs2_edit savemeta' and 'gfs2_edit restoremeta'. * the gfs2_edit savemeta function now properly saves blocks of type 2. * 'gfs2_convert -vy' now works properly on the PowerPC architecture. * when mounting a GFS2 file system as '/', mount_gfs2 no longer fails after being unable to find the file system in '/proc/mounts'. * gfs2_fsck no longer segfaults when fixing 'EA leaf block type' problems. All gfs2-utils users should upgrade to this updated package, which resolves these issues. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 242701 - Add Filesystem UUID to GFS2 utils. 469773 - GFS2: gfs2_grow doesn't grow file system properly 474705 - GFS2: make gfs2_fsck conform to fsck(8) exit codes 474707 - GFS2: gfs2_convert not freeing blocks when removing file with height >=2 477072 - gfs2_fsck man page should be fsck.gfs2 man page 481762 - No longer able to mount GFS volume with noatime,noquota options 483799 - GFS2: gfs2_edit fixes for 5.4 485761 - GFS2: gfs2_tool df segfault on non-4K block size 486034 - gfs2_grow man page references removed -r option 487608 - GFS2: gfs2_tool unfreeze hangs 498646 - gfs2_fsck does not fix filesystem when 'journal is already locked for use' 501732 - mount failure after gfs2_edit restoremeta of GFS file system 502056 - GFS2: gfs2_edit savemeta needs to save freemeta blocks 506629 - GFS2: gfs2_convert, parameter not understood on ppc 510758 - fsck.gfs2 segfaults while fixing 'EA leaf block type' problem. 519436 - CVE-2008-6552 cman, gfs2-utils, rgmanager: multiple insecure temporary file use issues |
Original Source
Url : https://rhn.redhat.com/errata/RHSA-2009-1337.html |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-59 | Improper Link Resolution Before File Access ('Link Following') |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:11404 | |||
Oval ID: | oval:org.mitre.oval:def:11404 | ||
Title: | Red Hat Cluster Project 2.x allows local users to modify or overwrite arbitrary files via symlink attacks on files in /tmp, involving unspecified components in Resource Group Manager (aka rgmanager) before 2.03.09-1, gfs2-utils before 2.03.09-1, and CMAN - The Cluster Manager before 2.03.09-1 on Fedora 9. | ||
Description: | Red Hat Cluster Project 2.x allows local users to modify or overwrite arbitrary files via symlink attacks on files in /tmp, involving unspecified components in Resource Group Manager (aka rgmanager) before 2.03.09-1, gfs2-utils before 2.03.09-1, and CMAN - The Cluster Manager before 2.03.09-1 on Fedora 9. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2008-6552 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 5 CentOS Linux 5 Oracle Linux 5 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:22793 | |||
Oval ID: | oval:org.mitre.oval:def:22793 | ||
Title: | ELSA-2009:1337: gfs2-utils security and bug fix update (Low) | ||
Description: | Red Hat Cluster Project 2.x allows local users to modify or overwrite arbitrary files via symlink attacks on files in /tmp, involving unspecified components in Resource Group Manager (aka rgmanager) before 2.03.09-1, gfs2-utils before 2.03.09-1, and CMAN - The Cluster Manager before 2.03.09-1 on Fedora 9. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2009:1337-02 CVE-2008-6552 | Version: | 6 |
Platform(s): | Oracle Linux 5 | Product(s): | gfs2-utils |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:22844 | |||
Oval ID: | oval:org.mitre.oval:def:22844 | ||
Title: | ELSA-2009:1341: cman security, bug fix, and enhancement update (Low) | ||
Description: | Red Hat Cluster Project 2.x allows local users to modify or overwrite arbitrary files via symlink attacks on files in /tmp, involving unspecified components in Resource Group Manager (aka rgmanager) before 2.03.09-1, gfs2-utils before 2.03.09-1, and CMAN - The Cluster Manager before 2.03.09-1 on Fedora 9. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2009:1341-02 CVE-2008-4579 CVE-2008-6552 | Version: | 13 |
Platform(s): | Oracle Linux 5 | Product(s): | cman |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:22968 | |||
Oval ID: | oval:org.mitre.oval:def:22968 | ||
Title: | ELSA-2009:1339: rgmanager security, bug fix, and enhancement update (Low) | ||
Description: | Red Hat Cluster Project 2.x allows local users to modify or overwrite arbitrary files via symlink attacks on files in /tmp, involving unspecified components in Resource Group Manager (aka rgmanager) before 2.03.09-1, gfs2-utils before 2.03.09-1, and CMAN - The Cluster Manager before 2.03.09-1 on Fedora 9. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2009:1339-02 CVE-2008-6552 | Version: | 6 |
Platform(s): | Oracle Linux 5 | Product(s): | rgmanager |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:28953 | |||
Oval ID: | oval:org.mitre.oval:def:28953 | ||
Title: | RHSA-2009:1337 -- gfs2-utils security and bug fix update (Low) | ||
Description: | An updated gfs2-utils package that fixes multiple security issues and various bugs is now available for Red Hat Enterprise Linux 5. This update has been rated as having low security impact by the Red Hat Security Response Team. The gfs2-utils package provides the user-space tools necessary to mount, create, maintain, and test GFS2 file systems. Multiple insecure temporary file use flaws were discovered in GFS2 user level utilities. A local attacker could use these flaws to overwrite an arbitrary file writable by a victim running those utilities (typically root) with the output of the utilities via a symbolic link attack. (CVE-2008-6552) | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2009:1337 CESA-2009:1337-CentOS 5 CVE-2008-6552 | Version: | 3 |
Platform(s): | Red Hat Enterprise Linux 5 CentOS Linux 5 | Product(s): | gfs2-utils |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:29052 | |||
Oval ID: | oval:org.mitre.oval:def:29052 | ||
Title: | RHSA-2009:1341 -- cman security, bug fix, and enhancement update (Low) | ||
Description: | Updated cman packages that fix several security issues, various bugs, and add enhancements are now available for Red Hat Enterprise Linux 5. This update has been rated as having low security impact by the Red Hat Security Response Team. The Cluster Manager (cman) utility provides services for managing a Linux cluster. Multiple insecure temporary file use flaws were found in fence_apc_snmp and ccs_tool. A local attacker could use these flaws to overwrite an arbitrary file writable by a victim running those utilities (typically root) with the output of the utilities via a symbolic link attack. (CVE-2008-4579, CVE-2008-6552) | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2009:1341 CESA-2009:1341-CentOS 5 CVE-2008-4579 CVE-2008-6552 | Version: | 3 |
Platform(s): | Red Hat Enterprise Linux 5 CentOS Linux 5 | Product(s): | cman |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2011-08-09 | Name : CentOS Update for gfs2-utils CESA-2009:1337 centos5 i386 File : nvt/gb_CESA-2009_1337_gfs2-utils_centos5_i386.nasl |
2011-08-09 | Name : CentOS Update for rgmanager CESA-2009:1339 centos5 i386 File : nvt/gb_CESA-2009_1339_rgmanager_centos5_i386.nasl |
2011-08-09 | Name : CentOS Update for cman CESA-2009:1341 centos5 i386 File : nvt/gb_CESA-2009_1341_cman_centos5_i386.nasl |
2009-12-30 | Name : Ubuntu USN-875-1 (redhat-cluster-suite) File : nvt/ubuntu_875_1.nasl |
2009-09-21 | Name : CentOS Security Advisory CESA-2009:1337 (gfs2-utils) File : nvt/ovcesa2009_1337.nasl |
2009-09-21 | Name : CentOS Security Advisory CESA-2009:1339 (rgmanager) File : nvt/ovcesa2009_1339.nasl |
2009-09-21 | Name : CentOS Security Advisory CESA-2009:1341 (cman) File : nvt/ovcesa2009_1341.nasl |
2009-09-09 | Name : RedHat Security Advisory RHSA-2009:1337 File : nvt/RHSA_2009_1337.nasl |
2009-09-09 | Name : RedHat Security Advisory RHSA-2009:1339 File : nvt/RHSA_2009_1339.nasl |
2009-09-09 | Name : RedHat Security Advisory RHSA-2009:1341 File : nvt/RHSA_2009_1341.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
50300 | Cluster Project rgmanager Unspecified Temporary Files Privilege Escalation |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2013-01-24 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2009-1339.nasl - Type : ACT_GATHER_INFO |
2013-01-24 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2009-1341.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20090902_cman_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing a security update. File : sl_20090902_gfs2_utils_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing a security update. File : sl_20090902_rgmanager_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20110216_ccs_on_SL4_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing a security update. File : sl_20110216_rgmanager_on_SL4_x.nasl - Type : ACT_GATHER_INFO |
2010-01-06 | Name : The remote CentOS host is missing a security update. File : centos_RHSA-2009-1337.nasl - Type : ACT_GATHER_INFO |
2010-01-06 | Name : The remote CentOS host is missing a security update. File : centos_RHSA-2009-1339.nasl - Type : ACT_GATHER_INFO |
2010-01-06 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2009-1341.nasl - Type : ACT_GATHER_INFO |
2009-12-21 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-875-1.nasl - Type : ACT_GATHER_INFO |
2009-09-02 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2009-1337.nasl - Type : ACT_GATHER_INFO |
2008-11-07 | Name : The remote Fedora host is missing one or more security updates. File : fedora_2008-9458.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:52:50 |
|