Bug 709037 (CVE-2011-2147)

Summary: CVE-2011-2147 openswan: World writable pid and lock files
Product: [Other] Security Response Reporter: Jan Lieskovsky <jlieskov>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED NOTABUG QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: avagarwa
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2011-05-31 07:33:57 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Jan Lieskovsky 2011-05-30 13:00:12 UTC
Common Vulnerabilities and Exposures assigned an identifier CVE-2011-2147 to
the following vulnerability:

Openswan 2.2.x does not properly restrict permissions for (1) /var/run/
starter.pid, related to starter.c in the IPsec starter, and (2) /var/lock/
subsys/ipsec, which allows local users to kill arbitrary processes by writing
a PID to a file, or possibly bypass disk quotas by writing arbitrary data to
a file, as demonstrated by files with 0666 permissions, a different
vulnerability than CVE-2011-1784.

References:
[1] http://lists.debian.org/debian-security/2011/05/msg00013.html
[2] http://lists.debian.org/debian-security/2011/05/msg00018.html
[3] http://lists.debian.org/debian-security/2011/05/msg00012.html

Comment 2 Huzaifa S. Sidhpurwala 2011-05-31 07:32:25 UTC
Statement:

Not vulnerable. This issue did not affect the versions of openswan as shipped with Red Hat Enterprise Linux 5 or 6.

Comment 3 Huzaifa S. Sidhpurwala 2011-05-31 07:33:57 UTC
This issue does NOT affect the version of openswan shipped with Fedora 13, Fedora 14 or Fedora 15