First published: Thu Aug 28 2008(Updated: )
The cman package as shipped with Red Hat Enterprise Linux 5 and within Fedora release starting from 9 is prone to the symlink attack. Affected file: /sbin/fence_egenera Relevant part of the code: 296 sub pserver_shutdown 297 { 298 my $rtrn=1; 299 local *egen_log; 300 open(egen_log,">/tmp/eglog"); 301 for (my $trys=0; $trys<20; $trys++) 302 { 303 last if (pserver_status != 0); 304 305 306 my $status = $_; . . . Description: A malicious user could precreate a symlink, pointing to the file /tmp/eglog, Subsequent run of the '/sbin/egenera' command would destroy / truncate the target of this link to zero length. References: <a href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496374">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496374</a> (part for cman) Affected versions: This issue affects the version of cman package, as shipped with Red Hat Enteprise Linux 5 and those, shipped within the Fedora release starting from 9. The cman package as shipped with Red Hat Enteprise Linux 4 Cluster Suite product and that one, shipped within Fedora release of 8, are not affected by this issue.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat cman | >=5 | |
Fedora | >=9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-460476 is deemed to be medium due to the potential for a symlink attack.
To fix REDHAT-BUG-460476, ensure that you update the cman package to the latest version that addresses the symlink vulnerability.
REDHAT-BUG-460476 affects Red Hat Enterprise Linux 5 and Fedora releases starting from version 9.
A symlink attack refers to the exploitation of symbolic links to manipulate filesystem operations, potentially allowing unauthorized access or modifications.
As a workaround for REDHAT-BUG-460476, you can restrict permissions on the affected file /sbin/fence_egenera until a patch is applied.