| Summary: | sys-cluster/cman buffer overflow (CVE-2007-3373, 3374) | ||
|---|---|---|---|
| Product: | Gentoo Security | Reporter: | Matt Drew (RETIRED) <aetius> |
| Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
| Status: | RESOLVED INVALID | ||
| Severity: | normal | CC: | cluster |
| Priority: | High | ||
| Version: | unspecified | ||
| Hardware: | All | ||
| OS: | Linux | ||
| URL: | https://www.redhat.com/archives/cluster-devel/2007-June/msg00130.html | ||
| Whiteboard: | C1 [] aetius | ||
| Package list: | Runtime testing required: | --- | |
|
Description
Matt Drew (RETIRED)
2007-06-25 15:32:27 UTC
Setting status. It's not clear what version this applies to, I'm assuming the latest. Also the daemon appears to run as root, there are no provisions for privilege reduction in /etc/conf.d/cman or /etc/init.d/cman and no user in /etc/passwd to reduce privileges to. any news here? btw, CVE ids are: CVE-2007-3373 CVE-2007-3374 ha-cluster, please advise. ha-cluster please advise. This issue seems to affect cluster project 2.x whereas we only have 1.x in the tree hence we are likely not affected. I've grepped through the source and couldn't find any instance of the problematic code reported. Maybe somebody from ha-cluster can confirm this?? Markus Thx Markus. Closing as INVALID for now. |