Scientific Linux Security Update : resource-agents on SL6.x i386/x86_64

This script is Copyright (C) 2012-2014 Tenable Network Security, Inc.

Synopsis :

The remote Scientific Linux host is missing one or more security

Description :

The resource-agents package contains a set of scripts to interface
with several services to operate in a High Availability environment
for both Pacemaker and rgmanager service managers.

It was discovered that certain resource agent scripts set the
LD_LIBRARY_PATH environment variable to an insecure value containing
empty path elements. A local user able to trick a user running those
scripts to run them while working from an attacker-writable directory
could use this flaw to escalate their privileges via a specially
crafted dynamic library. (CVE-2010-3389)

This update also fixes the following bugs :

- When using the Sybase database and the ASEHAagent
resource in the cluster.conf file, it was not possible
to run more than one ASEHAagent per Sybase installation.
Consequently, a second ASEHA (Sybase Adaptive Server
Enterprise (ASE) with the High Availability Option)
agent could not be run. This bug has been fixed and it
is now possible to use two ASEHA agents using the same
Sybase installation.

- The s/lang scripts, which implement internal
functionality for the rgmanager package, while the
central_processing option is in use, were included in
the wrong package. Now, the rgmanager and
resource-agents packages require each other for
installation to prevent problems when they are used

- Previously, the script was using the
'shutdown abort' command as the first attempt to shut
down a database. With this update, first
attempts a graceful shutdown via the 'shutdown
immediate' command before forcing the shutdown.

- Previously, when setting up a service on a cluster with
a shared IP resource and an Apache resource, the
generated httpd.conf file contained a bug in the line
describing the shared IP address (the 'Listen' line).
Now, the Apache resource agent generates the 'Listen'
line properly.

- If a high-availability (HA) cluster service was defined
with an Apache resource and was named with two words,
such as 'kickstart httpd', the service never started
because it could not find a directory with the space
character in its name escaped. Now, Apache resources
work properly if a name contains a space as described

- When inheritance was used in the cluster.conf file, a
bug in the /usr/share/cluster/ file
prevented it from monitoring NFS exports properly.
Consequently, monitoring of NFS exports to NFS clients
resulted in an endless loop. This bug has been fixed and
the monitoring now works as expected.

- Previously, the postgres-8 resource agent did not detect
when a PostgreSQL server failed to start. This bug has
been fixed and postgres-8 now works as expected in the
described scenario.

- When using the Pacemaker resource manager, the
resource agent reported an error condition, if called
with the 'monitor' parameter and the referenced device
did not exist. Consequently, the error condition
prevented the resource from being started. Now,
returns the proper response code in the described
scenario, thus fixing this bug.

- Previously, numerous RGManager resource agents returned
incorrect response codes when coupled with the Pacemaker
resource manager. Now, the agents have been updated to
work with Pacemaker properly.

This update also adds the following enhancement :

- With this update, when the network is removed from a
node using the resource agent, it now recovers
faster than previously.

As well, this update upgrades the resource-agents package to upstream
version 3.9.2, which provides a number of bug fixes and enhancements
over the previous version.

All users of resource-agents are advised to upgrade to this updated
package, which corrects these issues and adds these enhancements.

See also :

Solution :

Update the affected resource-agents and / or resource-agents-debuginfo

Risk factor :

Medium / CVSS Base Score : 6.9

Family: Scientific Linux Local Security Checks

Nessus Plugin ID: 61196 ()

Bugtraq ID:

CVE ID: CVE-2010-3389

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now