http://secunia.com/advisories/25799/ A local user can trigger a DoS or possible code execution by sending overly long client cluster messages. There's a link to a patch in the linked Red Hat mailing list message.
Setting status. It's not clear what version this applies to, I'm assuming the latest. Also the daemon appears to run as root, there are no provisions for privilege reduction in /etc/conf.d/cman or /etc/init.d/cman and no user in /etc/passwd to reduce privileges to.
any news here? btw, CVE ids are: CVE-2007-3373 CVE-2007-3374
ha-cluster, please advise.
ha-cluster please advise.
This issue seems to affect cluster project 2.x whereas we only have 1.x in the tree hence we are likely not affected. I've grepped through the source and couldn't find any instance of the problematic code reported. Maybe somebody from ha-cluster can confirm this?? Markus
Thx Markus. Closing as INVALID for now.