rhsa-2009_1339
Vulnerability from csaf_redhat
Published
2009-09-02 08:00
Modified
2024-11-14 10:07
Summary
Red Hat Security Advisory: rgmanager security, bug fix, and enhancement update

Notes

Topic
An updated rgmanager package that fixes multiple security issues, various bugs, and adds enhancements is now available for Red Hat Enterprise Linux 5. This update has been rated as having low security impact by the Red Hat Security Response Team.
Details
The rgmanager package contains the Red Hat Resource Group Manager, which provides high availability for critical server applications in the event of system downtime. Multiple insecure temporary file use flaws were discovered in rgmanager and various resource scripts run by rgmanager. A local attacker could use these flaws to overwrite an arbitrary file writable by the rgmanager process (i.e. user root) with the output of rgmanager or a resource agent via a symbolic link attack. (CVE-2008-6552) This update also fixes the following bugs: * clulog now accepts '-' as the first character in messages. * if expire_time is 0, max_restarts is no longer ignored. * the SAP resource agents included in the rgmanager package shipped with Red Hat Enterprise Linux 5.3 were outdated. This update includes the most recent SAP resource agents and, consequently, improves SAP failover support. * empty PID files no longer cause resource start failures. * recovery policy of type 'restart' now works properly when using a resource based on ra-skelet.sh. * samba.sh has been updated to kill the PID listed in the proper PID file. * handling of the '-F' option has been improved to fix issues causing rgmanager to crash if no members of a restricted failover domain were online. * the number of simultaneous status checks can now be limited to prevent load spikes. * forking and cloning during status checks has been optimized to reduce load spikes. * rg_test no longer hangs when run with large cluster configuration files. * when rgmanager is used with a restricted failover domain it will no longer occasionally segfault when some nodes are offline during a failover event. * virtual machine guests no longer restart after a cluster.conf update. * nfsclient.sh no longer leaves temporary files after running. * extra checks from the Oracle agents have been removed. * vm.sh now uses libvirt. * users can now define an explicit service processing order when central_processing is enabled. * virtual machine guests can no longer start on 2 nodes at the same time. * in some cases a successfully migrated virtual machine guest could restart when the cluster.conf file was updated. * incorrect reporting of a service being started when it was not started has been addressed. As well, this update adds the following enhancements: * a startup_wait option has been added to the MySQL resource agent. * services can now be prioritized. * rgmanager now checks to see if it has been killed by the OOM killer and if so, reboots the node. Users of rgmanager are advised to upgrade to this updated package, which resolves these issues and adds these enhancements.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.



{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Low"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An updated rgmanager package that fixes multiple security issues, various\nbugs, and adds enhancements is now available for Red Hat Enterprise Linux\n5.\n\nThis update has been rated as having low security impact by the Red Hat\nSecurity Response Team.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The rgmanager package contains the Red Hat Resource Group Manager, which\nprovides high availability for critical server applications in the event of\nsystem downtime.\n\nMultiple insecure temporary file use flaws were discovered in rgmanager and\nvarious resource scripts run by rgmanager. A local attacker could use these\nflaws to overwrite an arbitrary file writable by the rgmanager process\n(i.e. user root) with the output of rgmanager or a resource agent via a\nsymbolic link attack. (CVE-2008-6552)\n\nThis update also fixes the following bugs:\n\n* clulog now accepts \u0027-\u0027 as the first character in messages.\n\n* if expire_time is 0, max_restarts is no longer ignored.\n\n* the SAP resource agents included in the rgmanager package shipped with\nRed Hat Enterprise Linux 5.3 were outdated. This update includes the most\nrecent SAP resource agents and, consequently, improves SAP failover\nsupport.\n\n* empty PID files no longer cause resource start failures.\n\n* recovery policy of type \u0027restart\u0027 now works properly when using a\nresource based on ra-skelet.sh.\n\n* samba.sh has been updated to kill the PID listed in the proper PID file.\n\n* handling of the \u0027-F\u0027 option has been improved to fix issues causing\nrgmanager to crash if no members of a restricted failover domain were\nonline.\n\n* the number of simultaneous status checks can now be limited to prevent\nload spikes.\n\n* forking and cloning during status checks has been optimized to reduce\nload spikes.\n\n* rg_test no longer hangs when run with large cluster configuration files.\n\n* when rgmanager is used with a restricted failover domain it will no\nlonger occasionally segfault when some nodes are offline during a failover\nevent.\n\n* virtual machine guests no longer restart after a cluster.conf update.\n\n* nfsclient.sh no longer leaves temporary files after running.\n\n* extra checks from the Oracle agents have been removed.\n\n* vm.sh now uses libvirt.\n\n* users can now define an explicit service processing order when\ncentral_processing is enabled.\n\n* virtual machine guests can no longer start on 2 nodes at the same time.\n\n* in some cases a successfully migrated virtual machine guest could restart\nwhen the cluster.conf file was updated.\n\n* incorrect reporting of a service being started when it was not started\nhas been addressed.\n\nAs well, this update adds the following enhancements:\n\n* a startup_wait option has been added to the MySQL resource agent.\n\n* services can now be prioritized.\n\n* rgmanager now checks to see if it has been killed by the OOM killer and\nif so, reboots the node.\n\nUsers of rgmanager are advised to upgrade to this updated package, which\nresolves these issues and adds these enhancements.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2009:1339",
        "url": "https://access.redhat.com/errata/RHSA-2009:1339"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#low",
        "url": "https://access.redhat.com/security/updates/classification/#low"
      },
      {
        "category": "external",
        "summary": "250718",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=250718"
      },
      {
        "category": "external",
        "summary": "412911",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=412911"
      },
      {
        "category": "external",
        "summary": "449394",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=449394"
      },
      {
        "category": "external",
        "summary": "468691",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=468691"
      },
      {
        "category": "external",
        "summary": "470917",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=470917"
      },
      {
        "category": "external",
        "summary": "471066",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=471066"
      },
      {
        "category": "external",
        "summary": "471226",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=471226"
      },
      {
        "category": "external",
        "summary": "471431",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=471431"
      },
      {
        "category": "external",
        "summary": "474444",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=474444"
      },
      {
        "category": "external",
        "summary": "475826",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=475826"
      },
      {
        "category": "external",
        "summary": "481058",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=481058"
      },
      {
        "category": "external",
        "summary": "482858",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=482858"
      },
      {
        "category": "external",
        "summary": "483093",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=483093"
      },
      {
        "category": "external",
        "summary": "486349",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=486349"
      },
      {
        "category": "external",
        "summary": "486717",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=486717"
      },
      {
        "category": "external",
        "summary": "488714",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=488714"
      },
      {
        "category": "external",
        "summary": "489785",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=489785"
      },
      {
        "category": "external",
        "summary": "490449",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=490449"
      },
      {
        "category": "external",
        "summary": "490455",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=490455"
      },
      {
        "category": "external",
        "summary": "492828",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=492828"
      },
      {
        "category": "external",
        "summary": "494977",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=494977"
      },
      {
        "category": "external",
        "summary": "505340",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=505340"
      },
      {
        "category": "external",
        "summary": "514044",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=514044"
      },
      {
        "category": "external",
        "summary": "519436",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=519436"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1339.json"
      }
    ],
    "title": "Red Hat Security Advisory: rgmanager security, bug fix, and enhancement update",
    "tracking": {
      "current_release_date": "2024-11-14T10:07:26+00:00",
      "generator": {
        "date": "2024-11-14T10:07:26+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.0"
        }
      },
      "id": "RHSA-2009:1339",
      "initial_release_date": "2009-09-02T08:00:00+00:00",
      "revision_history": [
        {
          "date": "2009-09-02T08:00:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2009-09-01T06:42:29+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-14T10:07:26+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Clustering (v. 5 server)",
                "product": {
                  "name": "Red Hat Enterprise Linux Clustering (v. 5 server)",
                  "product_id": "5Server-Cluster",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_cluster:5"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "rgmanager-debuginfo-0:2.0.52-1.el5.ia64",
                "product": {
                  "name": "rgmanager-debuginfo-0:2.0.52-1.el5.ia64",
                  "product_id": "rgmanager-debuginfo-0:2.0.52-1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/rgmanager-debuginfo@2.0.52-1.el5?arch=ia64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "rgmanager-0:2.0.52-1.el5.ia64",
                "product": {
                  "name": "rgmanager-0:2.0.52-1.el5.ia64",
                  "product_id": "rgmanager-0:2.0.52-1.el5.ia64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/rgmanager@2.0.52-1.el5?arch=ia64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ia64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "rgmanager-debuginfo-0:2.0.52-1.el5.ppc",
                "product": {
                  "name": "rgmanager-debuginfo-0:2.0.52-1.el5.ppc",
                  "product_id": "rgmanager-debuginfo-0:2.0.52-1.el5.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/rgmanager-debuginfo@2.0.52-1.el5?arch=ppc"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "rgmanager-0:2.0.52-1.el5.ppc",
                "product": {
                  "name": "rgmanager-0:2.0.52-1.el5.ppc",
                  "product_id": "rgmanager-0:2.0.52-1.el5.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/rgmanager@2.0.52-1.el5?arch=ppc"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "rgmanager-debuginfo-0:2.0.52-1.el5.x86_64",
                "product": {
                  "name": "rgmanager-debuginfo-0:2.0.52-1.el5.x86_64",
                  "product_id": "rgmanager-debuginfo-0:2.0.52-1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/rgmanager-debuginfo@2.0.52-1.el5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "rgmanager-0:2.0.52-1.el5.x86_64",
                "product": {
                  "name": "rgmanager-0:2.0.52-1.el5.x86_64",
                  "product_id": "rgmanager-0:2.0.52-1.el5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/rgmanager@2.0.52-1.el5?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "rgmanager-debuginfo-0:2.0.52-1.el5.i386",
                "product": {
                  "name": "rgmanager-debuginfo-0:2.0.52-1.el5.i386",
                  "product_id": "rgmanager-debuginfo-0:2.0.52-1.el5.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/rgmanager-debuginfo@2.0.52-1.el5?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "rgmanager-0:2.0.52-1.el5.i386",
                "product": {
                  "name": "rgmanager-0:2.0.52-1.el5.i386",
                  "product_id": "rgmanager-0:2.0.52-1.el5.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/rgmanager@2.0.52-1.el5?arch=i386"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i386"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "rgmanager-0:2.0.52-1.el5.src",
                "product": {
                  "name": "rgmanager-0:2.0.52-1.el5.src",
                  "product_id": "rgmanager-0:2.0.52-1.el5.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/rgmanager@2.0.52-1.el5?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rgmanager-0:2.0.52-1.el5.i386 as a component of Red Hat Enterprise Linux Clustering (v. 5 server)",
          "product_id": "5Server-Cluster:rgmanager-0:2.0.52-1.el5.i386"
        },
        "product_reference": "rgmanager-0:2.0.52-1.el5.i386",
        "relates_to_product_reference": "5Server-Cluster"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rgmanager-0:2.0.52-1.el5.ia64 as a component of Red Hat Enterprise Linux Clustering (v. 5 server)",
          "product_id": "5Server-Cluster:rgmanager-0:2.0.52-1.el5.ia64"
        },
        "product_reference": "rgmanager-0:2.0.52-1.el5.ia64",
        "relates_to_product_reference": "5Server-Cluster"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rgmanager-0:2.0.52-1.el5.ppc as a component of Red Hat Enterprise Linux Clustering (v. 5 server)",
          "product_id": "5Server-Cluster:rgmanager-0:2.0.52-1.el5.ppc"
        },
        "product_reference": "rgmanager-0:2.0.52-1.el5.ppc",
        "relates_to_product_reference": "5Server-Cluster"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rgmanager-0:2.0.52-1.el5.src as a component of Red Hat Enterprise Linux Clustering (v. 5 server)",
          "product_id": "5Server-Cluster:rgmanager-0:2.0.52-1.el5.src"
        },
        "product_reference": "rgmanager-0:2.0.52-1.el5.src",
        "relates_to_product_reference": "5Server-Cluster"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rgmanager-0:2.0.52-1.el5.x86_64 as a component of Red Hat Enterprise Linux Clustering (v. 5 server)",
          "product_id": "5Server-Cluster:rgmanager-0:2.0.52-1.el5.x86_64"
        },
        "product_reference": "rgmanager-0:2.0.52-1.el5.x86_64",
        "relates_to_product_reference": "5Server-Cluster"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rgmanager-debuginfo-0:2.0.52-1.el5.i386 as a component of Red Hat Enterprise Linux Clustering (v. 5 server)",
          "product_id": "5Server-Cluster:rgmanager-debuginfo-0:2.0.52-1.el5.i386"
        },
        "product_reference": "rgmanager-debuginfo-0:2.0.52-1.el5.i386",
        "relates_to_product_reference": "5Server-Cluster"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rgmanager-debuginfo-0:2.0.52-1.el5.ia64 as a component of Red Hat Enterprise Linux Clustering (v. 5 server)",
          "product_id": "5Server-Cluster:rgmanager-debuginfo-0:2.0.52-1.el5.ia64"
        },
        "product_reference": "rgmanager-debuginfo-0:2.0.52-1.el5.ia64",
        "relates_to_product_reference": "5Server-Cluster"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rgmanager-debuginfo-0:2.0.52-1.el5.ppc as a component of Red Hat Enterprise Linux Clustering (v. 5 server)",
          "product_id": "5Server-Cluster:rgmanager-debuginfo-0:2.0.52-1.el5.ppc"
        },
        "product_reference": "rgmanager-debuginfo-0:2.0.52-1.el5.ppc",
        "relates_to_product_reference": "5Server-Cluster"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rgmanager-debuginfo-0:2.0.52-1.el5.x86_64 as a component of Red Hat Enterprise Linux Clustering (v. 5 server)",
          "product_id": "5Server-Cluster:rgmanager-debuginfo-0:2.0.52-1.el5.x86_64"
        },
        "product_reference": "rgmanager-debuginfo-0:2.0.52-1.el5.x86_64",
        "relates_to_product_reference": "5Server-Cluster"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2008-6552",
      "cwe": {
        "id": "CWE-377",
        "name": "Insecure Temporary File"
      },
      "discovery_date": "2008-10-31T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "519436"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Red Hat Cluster Project 2.x allows local users to modify or overwrite arbitrary files via symlink attacks on files in /tmp, involving unspecified components in Resource Group Manager (aka rgmanager) before 2.03.09-1, gfs2-utils before 2.03.09-1, and CMAN - The Cluster Manager before 2.03.09-1 on Fedora 9.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "rgmanager: multiple insecure temporary file use issues",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Server-Cluster:rgmanager-0:2.0.52-1.el5.i386",
          "5Server-Cluster:rgmanager-0:2.0.52-1.el5.ia64",
          "5Server-Cluster:rgmanager-0:2.0.52-1.el5.ppc",
          "5Server-Cluster:rgmanager-0:2.0.52-1.el5.src",
          "5Server-Cluster:rgmanager-0:2.0.52-1.el5.x86_64",
          "5Server-Cluster:rgmanager-debuginfo-0:2.0.52-1.el5.i386",
          "5Server-Cluster:rgmanager-debuginfo-0:2.0.52-1.el5.ia64",
          "5Server-Cluster:rgmanager-debuginfo-0:2.0.52-1.el5.ppc",
          "5Server-Cluster:rgmanager-debuginfo-0:2.0.52-1.el5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2008-6552"
        },
        {
          "category": "external",
          "summary": "RHBZ#519436",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=519436"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2008-6552",
          "url": "https://www.cve.org/CVERecord?id=CVE-2008-6552"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-6552",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-6552"
        }
      ],
      "release_date": "2008-10-31T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2009-09-02T08:00:00+00:00",
          "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network.  Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
          "product_ids": [
            "5Server-Cluster:rgmanager-0:2.0.52-1.el5.i386",
            "5Server-Cluster:rgmanager-0:2.0.52-1.el5.ia64",
            "5Server-Cluster:rgmanager-0:2.0.52-1.el5.ppc",
            "5Server-Cluster:rgmanager-0:2.0.52-1.el5.src",
            "5Server-Cluster:rgmanager-0:2.0.52-1.el5.x86_64",
            "5Server-Cluster:rgmanager-debuginfo-0:2.0.52-1.el5.i386",
            "5Server-Cluster:rgmanager-debuginfo-0:2.0.52-1.el5.ia64",
            "5Server-Cluster:rgmanager-debuginfo-0:2.0.52-1.el5.ppc",
            "5Server-Cluster:rgmanager-debuginfo-0:2.0.52-1.el5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2009:1339"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 5.4,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:M/Au:N/C:N/I:P/A:C",
            "version": "2.0"
          },
          "products": [
            "5Server-Cluster:rgmanager-0:2.0.52-1.el5.i386",
            "5Server-Cluster:rgmanager-0:2.0.52-1.el5.ia64",
            "5Server-Cluster:rgmanager-0:2.0.52-1.el5.ppc",
            "5Server-Cluster:rgmanager-0:2.0.52-1.el5.src",
            "5Server-Cluster:rgmanager-0:2.0.52-1.el5.x86_64",
            "5Server-Cluster:rgmanager-debuginfo-0:2.0.52-1.el5.i386",
            "5Server-Cluster:rgmanager-debuginfo-0:2.0.52-1.el5.ia64",
            "5Server-Cluster:rgmanager-debuginfo-0:2.0.52-1.el5.ppc",
            "5Server-Cluster:rgmanager-debuginfo-0:2.0.52-1.el5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "rgmanager: multiple insecure temporary file use issues"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.