A insecure file permissions flaw was found in the way IPMI event daemon of the OpenIPMI (Intelligent Platform Management Interface) library and tools created its PID file (it was created with 0666 permissions). A local user could use this flaw to kill arbitrary running process during ipmievd service shutdown.
This issue did NOT affect the version of the OpenIPMI package, as shipped with Red Hat Enterprise Linux 4. -- This issue did NOT affect the version of the OpenIPMI package, as shipped with Red Hat Enterprise Linux 5 in the default configuration. Though custom configurations of the ipmievd daemon (those using /var/run/ipmievd.pid as a PID file) are affected by this issue too. -- This issue affects the versions of the ipmitool package, as shipped with Red Hat Enterprise Linux 6. -- This issue did NOT affect the versions of the ipmitool package, as shipped with Fedora release of 14, 15, and 16 in the default configuration. Though custom configurations of the ipmievd daemon (those using /var/run/ipmievd.pid as a PID file) are affected by this issue too.
Jan, Hi, could you please look at the patch and let me know if you are ok with it?
(In reply to comment #10) > Hi, could you please look at the patch and let me know if you are ok with it? Yes, the patch is fine.
Created ipmitool tracking bugs for this issue Affects: fedora-all [bug 767049]
This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2011:1814 https://rhn.redhat.com/errata/RHSA-2011-1814.html
ipmitool-1.8.11-7.fc15 has been pushed to the Fedora 15 stable repository. If problems still persist, please make note of it in this bug report.
ipmitool-1.8.11-8.fc16 has been pushed to the Fedora 16 stable repository. If problems still persist, please make note of it in this bug report.
This issue has been addressed in following products: Red Hat Enterprise Linux 5 Via RHSA-2013:0123 https://rhn.redhat.com/errata/RHSA-2013-0123.html
Statement: (none)