Bug 498983 - cluster product is affected by several symlink attack vulnerabilities
Summary: cluster product is affected by several symlink attack vulnerabilities
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Cluster Suite
Classification: Retired
Component: fence
Version: 4
Hardware: All
OS: Linux
high
urgent
Target Milestone: ---
Assignee: Marek Grac
QA Contact: Cluster QE
URL:
Whiteboard:
Depends On: 469338
Blocks:
TreeView+ depends on / blocked
 
Reported: 2009-05-04 17:08 UTC by Fabio Massimo Di Nitto
Modified: 2016-04-26 13:39 UTC (History)
6 users (show)

Fixed In Version: fence-1.32.68-5.el4
Doc Type: Bug Fix
Doc Text:
Option -v for verbose mode now expects filename.
Clone Of: 469338
Environment:
Last Closed: 2011-02-16 16:15:48 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2011:0266 0 normal SHIPPED_LIVE Low: fence security, bug fix, and enhancement update 2011-02-16 16:14:08 UTC

Comment 1 Marek Grac 2009-06-26 10:52:38 UTC
Option -v for verbose mode now expects filename.  

Fixed in:
http://git.fedorahosted.org/git/cluster.git?p=cluster.git;a=commit;h=7868c811ac968bc973ab452f5bcf1676d65565bd

Comment 2 Marek Grac 2009-06-26 10:52:38 UTC
Release note added. If any revisions are required, please set the 
"requires_release_notes" flag to "?" and edit the "Release Notes" field accordingly.
All revisions will be proofread by the Engineering Content Services team.

New Contents:
Option -v for verbose mode now expects filename.

Comment 5 Dean Jansa 2011-01-21 23:22:58 UTC
[root@marathon-virt-01 rhn]# fence_apc_snmp -h
Usage:

Options:
  -h               Usage
  -a <ip>          IP address or hostname of fence device
  -u <udpport>     UDP port to use (default 161)
  -c <community>   SNMP community (default 'private')
  -n <num>         Outlet name/number to act on
  -o <string>      Action: Reboot (default), On, Off and Status
  -v <filename>    Verbose mode - write to file
  -V               Version
0

Comment 6 errata-xmlrpc 2011-02-16 16:15:48 UTC
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on therefore solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.

http://rhn.redhat.com/errata/RHSA-2011-0266.html


Note You need to log in before you can comment on or make changes to this bug.