"-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Low: gfs2-utils security and bug fix update
Advisory ID: RHSA-2009:1337-02
Product: Red Hat Enterprise Linux
Advisory URL: https://rhn.redhat.com/errata/RHSA-2009-1337.html
Issue date: 2009-09-02
Keywords: gfs2-utils
CVE Names: CVE-2008-6552
=====================================================================
1. Summary:
An updated gfs2-utils package that fixes multiple security issues and
various bugs is now available for Red Hat Enterprise Linux 5.
This update has been rated as having low security impact by the Red Hat
Security Response Team.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64
Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64
3. Description:
The gfs2-utils package provides the user-space tools necessary to mount,
create, maintain, and test GFS2 file systems.
Multiple insecure temporary file use flaws were discovered in GFS2 user
level utilities. A local attacker could use these flaws to overwrite an
arbitrary file writable by a victim running those utilities (typically
root) with the output of the utilities via a symbolic link attack.
(CVE-2008-6552)
This update also fixes the following bugs:
* gfs2_fsck now properly detects and repairs problems with sequence numbers
on GFS2 file systems.
* GFS2 user utilities now use the file system UUID.
* gfs2_grow now properly updates the file system size during operation.
* gfs2_fsck now returns the proper exit codes.
* gfs2_convert now properly frees blocks when removing free blocks up to
height 2.
* the gfs2_fsck manual page has been renamed to fsck.gfs2 to match current
standards.
* the 'gfs2_tool df' command now provides human-readable output.
* mounting GFS2 file systems with the noatime or noquota option now works
properly.
* new capabilities have been added to the gfs2_edit tool to help in testing
and debugging GFS and GFS2 issues.
* the 'gfs2_tool df' command no longer segfaults on file systems with a
block size other than 4k.
* the gfs2_grow manual page no longer references the '-r' option, which has
been removed.
* the 'gfs2_tool unfreeze' command no longer hangs during use.
* gfs2_convert no longer corrupts file systems when converting from GFS to
GFS2.
* gfs2_fsck no longer segfaults when encountering a block which is listed
as both a data and stuffed directory inode.
* gfs2_fsck can now fix file systems even if the journal is already locked
for use.
* a GFS2 file system's metadata is now properly copied with 'gfs2_edit
savemeta' and 'gfs2_edit restoremeta'.
* the gfs2_edit savemeta function now properly saves blocks of type 2.
* 'gfs2_convert -vy' now works properly on the PowerPC architecture.
* when mounting a GFS2 file system as '/', mount_gfs2 no longer fails after
being unable to find the file system in '/proc/mounts'.
* gfs2_fsck no longer segfaults when fixing 'EA leaf block type' problems.
All gfs2-utils users should upgrade to this updated package, which resolves
these issues.
4. Solution:
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259
5. Bugs fixed (http://bugzilla.redhat.com/):
242701 - Add Filesystem UUID to GFS2 utils.
469773 - GFS2: gfs2_grow doesn't grow file system properly
474705 - GFS2: make gfs2_fsck conform to fsck(8) exit codes
474707 - GFS2: gfs2_convert not freeing blocks when removing file with height >=2
477072 - gfs2_fsck man page should be fsck.gfs2 man page
481762 - No longer able to mount GFS volume with noatime,noquota options
483799 - GFS2: gfs2_edit fixes for 5.4
485761 - GFS2: gfs2_tool df segfault on non-4K block size
486034 - gfs2_grow man page references removed -r option
487608 - GFS2: gfs2_tool unfreeze hangs
498646 - gfs2_fsck does not fix filesystem when 'journal is already locked for use'
501732 - mount failure after gfs2_edit restoremeta of GFS file system
502056 - GFS2: gfs2_edit savemeta needs to save freemeta blocks
506629 - GFS2: gfs2_convert, parameter not understood on ppc
510758 - fsck.gfs2 segfaults while fixing 'EA leaf block type' problem.
519436 - CVE-2008-6552 cman, gfs2-utils, rgmanager: multiple insecure temporary file use issues
6. Package List:
Red Hat Enterprise Linux Desktop (v. 5 client):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/gfs2-utils-0.1.62-1.el5.src.rpm
i386:
gfs2-utils-0.1.62-1.el5.i386.rpm
gfs2-utils-debuginfo-0.1.62-1.el5.i386.rpm
x86_64:
gfs2-utils-0.1.62-1.el5.x86_64.rpm
gfs2-utils-debuginfo-0.1.62-1.el5.x86_64.rpm
Red Hat Enterprise Linux (v. 5 server):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/gfs2-utils-0.1.62-1.el5.src.rpm
i386:
gfs2-utils-0.1.62-1.el5.i386.rpm
gfs2-utils-debuginfo-0.1.62-1.el5.i386.rpm
ia64:
gfs2-utils-0.1.62-1.el5.ia64.rpm
gfs2-utils-debuginfo-0.1.62-1.el5.ia64.rpm
ppc:
gfs2-utils-0.1.62-1.el5.ppc.rpm
gfs2-utils-debuginfo-0.1.62-1.el5.ppc.rpm
s390x:
gfs2-utils-0.1.62-1.el5.s390x.rpm
gfs2-utils-debuginfo-0.1.62-1.el5.s390x.rpm
x86_64:
gfs2-utils-0.1.62-1.el5.x86_64.rpm
gfs2-utils-debuginfo-0.1.62-1.el5.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package
7. References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6552
http://www.redhat.com/security/updates/classification/#low
8. Contact:
The Red Hat security contact is . More contact
details at https://www.redhat.com/security/team/contact/
Copyright 2009 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFKniKRXlSAg2UNWIIRAuVaAKC4DuQv08PQBMmzJJs/sWnY5aN/pACgkdWH
inFl2QiVaXbBJ1dXPZg/nAk=
=QTFs
-----END PGP SIGNATURE-----
"
Prince in rent deposit lawsuitRHSA-2009:1232-01 Moderate: gnutls security update
This entry was posted
on 6:39 PM
.
Archives
-
▼
2009
(488)
-
▼
September
(53)
- RHSA-2009:1465-01 Important: kvm security and bug ...
- RHSA-2009:1466-01 Important: kernel security and b...
- DSA 1897-1: New horde3 packages fix arbitrary code...
- DSA 1895-1: New xmltooling packages fix potential ...
- DSA 1894-1: New newt packages fix arbitrary code e...
- DSA 1892-1: New dovecot packages fix arbitrary cod...
- GLSA 200909-20 cURL: Certificate validation error
- RHSA-2009:1461-01 Important: Red Hat Application S...
- RHSA-2009:1463-01 Moderate: newt security update
- USN-837-1: Newt vulnerability
- RHSA-2009:1452-01 Moderate: neon security update
- DSA 1891-1: New changetrack packages fix arbitrary...
- USN-836-1: WebKit vulnerabilities
- RHSA-2009:1459-04 Important: cyrus-imapd security ...
- RHSA-2009:1453-01 Moderate: pidgin security update
- USN-835-1: neon vulnerabilities
- DSA 1888-1: New openssl packages deprecate MD2 has...
- USN-834-1: PostgreSQL vulnerabilities
- GLSA 200909-19 Dnsmasq: Multiple vulnerabilities
- GLSA 200909-18 nginx: Remote execution of arbitra...
- DSA 1889-1: New icu packages correct multibyte seq...
- USN-830-1: OpenSSL vulnerability
- RHSA-2009:1438-01 Important: kernel security and b...
- USN-832-1: FreeRADIUS vulnerability
- DSA 1884-1: New nginx packages fix arbitrary code ...
- RHSA-2009:1451-01 Moderate: freeradius security up...
- DSA 1883-2: New nagios2 packages fix regression
- GLSA 200909-17 ZNC: Directory traversal
- USN-821-1: Firefox and Xulrunner vulnerabilities
- DSA 1887-1: New rails packages fix cross-site scri...
- GLSA 200909-14 Horde: Multiple vulnerabilities
- GLSA 200909-16 Wireshark: Denial of Service
- DSA 1878-2: New devscripts packages fix regressions
- GLSA 200909-12 HTMLDOC: User-assisted execution o...
- GLSA 200909-09 Screenie: Insecure temporary file ...
- DSA 1883-1: New nagios2 packages fix several cross...
- RHSA-2009:1432-01 Critical: seamonkey security update
- RHSA-2009:1431-01 Critical: seamonkey security update
- RHSA-2009:1430-01 Critical: firefox security update
- DSA 1879-1: New silc-client/silc-toolkit packages ...
- GLSA 200909-04 Clam AntiVirus: Multiple vulnerabi...
- DSA 1878-1: New devscripts packages fix remote cod...
- DSA 1881-1: New cyrus-imapd packages fix arbitrary...
- GLSA 200909-01 Linux-PAM: Privilege escalation
- GLSA 200909-02 libvorbis: User-assisted execution...
- RHSA-2009:1339-02 Low: rgmanager security, bug fix...
- RHSA-2009:1289-02 Moderate: mysql security and bug...
- RHSA-2009:1321-02 Low: nfs-utils security and bug ...
- RHSA-2009:1278-02 Low: lftp security and bug fix u...
- RHSA-2009:1341-02 Low: cman security, bug fix, and...
- RHSA-2009:1337-02 Low: gfs2-utils security and bug...
- RHSA-2009:1232-01 Moderate: gnutls security update
- RHSA-2009:1239-02 Important: kernel-rt security an...
-
▼
September
(53)