Summary: | <sys-fs/multipath-tools-0.4.8-r1 World-writable socket (CVE-2009-0115) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Robert Buchholz (RETIRED) <rbu> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | base-system |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://download.opensuse.org/update/10.3-test/repodata/patch-kpartx-6082.xml | ||
Whiteboard: | B3 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Robert Buchholz (RETIRED)
![]() base-system, ping In 0.4.8-r1 (1.2) now, cleared for stable request (has some other fixes in it too). Arches, please test and mark stable: =sys-fs/multipath-tools-0.4.8-r1 Target keywords : "amd64 ppc ppc64 x86" ppc64 done x86 stable amd64 stable Marked ppc stable. GLSA vote: yes. +1 vote as the maintainer. Anybody writing to the socket locally can cause SAN disks to go offline, potentially causing an entire OCFS2 cluster to fence/panic. I've confirmed this problem exists in my production cluster. chmod o-rwx /var/run/multipath.sock works around it at runtime. But it's less then ideal. Please fire off a GLSA for this to raise awareness. GLSA request filed. GLSA 201006-10 |