Bug 742837 (CVE-2011-4339)

Summary: CVE-2011-4339 OpenIPMI: IPMI event daemon creates PID file with world writeable permissions
Product: [Other] Security Response Reporter: Masahiro Matsuya <mmatsuya>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: aledvink, jlieskov, jnevill, jsafrane, kvolny, ovasik, SCHAKRAB, security-response-team, vdanen
Target Milestone: ---Keywords: Patch, Reopened, Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard: impact=moderate,public=20111213,reported=20111003,source=redhat,cvss2=4.7/AV:L/AC:M/Au:N/C:N/I:N/A:C,rhel-4/OpenIPMI=notaffected,rhel-5/OpenIPMI=affected/impact=low/cvss2=4.0/AV:L/AC:H/Au:N/C:N/I:N/A:C,rhel-6/ipmitool=affected,fedora-all/ipmitool=affected
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2013-01-08 09:10:07 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---
Bug Depends On: 756684, 756685, 767049, 834190    
Bug Blocks: 753218, 816611    
Attachments:
Description Flags
proposed patch to remove umask(0) none

Comment 3 Jan Lieskovsky 2011-11-11 14:14:04 UTC
A insecure file permissions flaw was found in the way IPMI event daemon of the  OpenIPMI (Intelligent Platform Management Interface) library and tools created its PID file (it was created with 0666 permissions). A local user could use this flaw to kill arbitrary running process during ipmievd service shutdown.

Comment 5 Jan Lieskovsky 2011-11-11 15:48:08 UTC
This issue did NOT affect the version of the OpenIPMI package, as shipped with Red Hat Enterprise Linux 4.

--

This issue did NOT affect the version of the OpenIPMI package, as shipped with Red Hat Enterprise Linux 5 in the default configuration. Though custom configurations of the ipmievd daemon (those using /var/run/ipmievd.pid as a PID file) are affected by this issue too.

--

This issue affects the versions of the ipmitool package, as shipped with Red Hat Enterprise Linux 6.

--

This issue did NOT affect the versions of the ipmitool package, as shipped with Fedora release of 14, 15, and 16 in the default configuration. Though custom configurations of the ipmievd daemon (those using /var/run/ipmievd.pid as a PID file) are affected by this issue too.

Comment 10 Huzaifa S. Sidhpurwala 2011-11-23 09:42:39 UTC
Jan,

Hi, could you please look at the patch and let me know if you are ok with it?

Comment 11 Jan Safranek 2011-11-23 10:00:55 UTC
(In reply to comment #10)
> Hi, could you please look at the patch and let me know if you are ok with it?

Yes, the patch is fine.

Comment 23 Huzaifa S. Sidhpurwala 2011-12-13 03:55:46 UTC
Created ipmitool tracking bugs for this issue

Affects: fedora-all [bug 767049]

Comment 24 errata-xmlrpc 2011-12-13 21:08:43 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 6

Via RHSA-2011:1814 https://rhn.redhat.com/errata/RHSA-2011-1814.html

Comment 26 Fedora Update System 2012-01-02 21:55:53 UTC
ipmitool-1.8.11-7.fc15 has been pushed to the Fedora 15 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 27 Fedora Update System 2012-01-02 21:56:28 UTC
ipmitool-1.8.11-8.fc16 has been pushed to the Fedora 16 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 32 errata-xmlrpc 2013-01-08 04:52:25 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5

Via RHSA-2013:0123 https://rhn.redhat.com/errata/RHSA-2013-0123.html

Comment 34 Huzaifa S. Sidhpurwala 2013-01-08 09:10:07 UTC
Statement:

(none)