Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2011:1580 - Security Advisory
Issued:
2011-12-06
Updated:
2011-12-06

RHSA-2011:1580 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Low: resource-agents security, bug fix, and enhancement update

Type/Severity

Security Advisory: Low

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An updated resource-agents package that fixes one security issue, several
bugs, and adds multiple enhancements is now available for Red Hat
Enterprise Linux 6.

The Red Hat Security Response Team has rated this update as having low
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

Description

The resource-agents package contains a set of scripts to interface with
several services to operate in a High Availability environment for both
Pacemaker and rgmanager service managers.

It was discovered that certain resource agent scripts set the
LD_LIBRARY_PATH environment variable to an insecure value containing empty
path elements. A local user able to trick a user running those scripts to
run them while working from an attacker-writable directory could use this
flaw to escalate their privileges via a specially-crafted dynamic library.
(CVE-2010-3389)

Red Hat would like to thank Raphael Geissert for reporting this issue.

This update also fixes the following bugs:

  • When using the Sybase database and the ASEHAagent resource in the

cluster.conf file, it was not possible to run more than one ASEHAagent per
Sybase installation. Consequently, a second ASEHA (Sybase Adaptive Server
Enterprise (ASE) with the High Availability Option) agent could not be run.
This bug has been fixed and it is now possible to use two ASEHA agents
using the same Sybase installation. (BZ#711852)

  • The s/lang scripts, which implement internal functionality for the

rgmanager package, while the central_processing option is in use, were
included in the wrong package. Now, the rgmanager and resource-agents
packages require each other for installation to prevent problems when they
are used separately. (BZ#693518)

  • Previously, the oracledb.sh script was using the "shutdown abort" command

as the first attempt to shut down a database. With this update, oracledb.sh
first attempts a graceful shutdown via the "shutdown immediate" command
before forcing the shutdown. (BZ#689801)

  • Previously, when setting up a service on a cluster with a shared IP

resource and an Apache resource, the generated httpd.conf file contained a
bug in the line describing the shared IP address (the "Listen" line). Now,
the Apache resource agent generates the "Listen" line properly. (BZ#667217)

  • If a high-availability (HA) cluster service was defined with an Apache

resource and was named with two words, such as "kickstart httpd", the
service never started because it could not find a directory with the space
character in its name escaped. Now, Apache resources work properly if a
name contains a space as described above. (BZ#667222)

  • When inheritance was used in the cluster.conf file, a bug in the

/usr/share/cluster/nfsclient.sh file prevented it from monitoring NFS
exports properly. Consequently, monitoring of NFS exports to NFS clients
resulted in an endless loop. This bug has been fixed and the monitoring now
works as expected. (BZ#691814)

  • Previously, the postgres-8 resource agent did not detect when a

PostgreSQL server failed to start. This bug has been fixed and postgres-8
now works as expected in the described scenario. (BZ#694816)

  • When using the Pacemaker resource manager, the fs.sh resource agent

reported an error condition, if called with the "monitor" parameter and the
referenced device did not exist. Consequently, the error condition
prevented the resource from being started. Now, fs.sh returns the proper
response code in the described scenario, thus fixing this bug. (BZ#709400)

  • Previously, numerous RGManager resource agents returned incorrect

response codes when coupled with the Pacemaker resource manager. Now, the
agents have been updated to work with Pacemaker properly. (BZ#727643)

This update also adds the following enhancement:

  • With this update, when the network is removed from a node using the

netfs.sh resource agent, it now recovers faster than previously.
(BZ#678497)

As well, this update upgrades the resource-agents package to upstream
version 3.9.2, which provides a number of bug fixes and enhancements over
the previous version. (BZ#707127)

All users of resource-agents are advised to upgrade to this updated
package, which corrects these issues and adds these enhancements.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Affected Products

  • Red Hat Enterprise Linux High Availability for x86_64 6 x86_64
  • Red Hat Enterprise Linux High Availability for x86_64 6 i386
  • Red Hat Enterprise Linux Resilient Storage for x86_64 6 x86_64
  • Red Hat Enterprise Linux Resilient Storage for x86_64 6 i386
  • Red Hat Enterprise Linux High Availability (for RHEL Server) from RHUI 6 x86_64
  • Red Hat Enterprise Linux High Availability (for RHEL Server) from RHUI 6 i386
  • Red Hat Enterprise Linux Resilient Storage (for RHEL Server) from RHUI 6 x86_64
  • Red Hat Enterprise Linux Resilient Storage (for RHEL Server) from RHUI 6 i386

Fixes

  • BZ - 639044 - CVE-2010-3389 rgmanager: insecure library loading vulnerability
  • BZ - 661888 - Support/testing of XFS filesystem as part of RHEL HA Add On
  • BZ - 667217 - Listen line in generated httpd.conf incorrect
  • BZ - 667222 - Apache resources with spaces in their names fail to start
  • BZ - 678497 - netfs.sh patch, when network is lost it takes too long to unmount the NFS filesystems
  • BZ - 691814 - nfsclient exports doens't work.
  • BZ - 693518 - Move rgmanager S/Lang from resource-agents to rgmanager
  • BZ - 694816 - postgres-8 resource agent does not detect a failed start of postgres server
  • BZ - 707127 - resource-agents rebase
  • BZ - 709400 - fs.sh resource agent monitor should not return an error if device does not exist.
  • BZ - 711852 - second ASEHA agent wont start - Unique attribute collision
  • BZ - 727643 - Modify major resource-agent agents to provide proper return codes to pacemaker

CVEs

  • CVE-2010-3389

References

  • https://access.redhat.com/security/updates/classification/#low
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux High Availability for x86_64 6

SRPM
resource-agents-3.9.2-7.el6.src.rpm SHA-256: e1ab117d20c3f2def1055142edfc01a96ac1f1f463cf8996d8596cf007362d1f
x86_64
resource-agents-3.9.2-7.el6.x86_64.rpm SHA-256: 17f266a9ddad8616d6d9968fbceb3ba220d97ec4713b8208b3df2b7e026dbd2c
resource-agents-debuginfo-3.9.2-7.el6.x86_64.rpm SHA-256: 63ce0c939ce06b70579c9f4a32b0df60d9b4e53f5a928567ed93cfc8f7f37d0f
i386
resource-agents-3.9.2-7.el6.i686.rpm SHA-256: ac491d4451604a286d6fc458c848e591471c06d6d45590e30d40d2a1e238449c
resource-agents-debuginfo-3.9.2-7.el6.i686.rpm SHA-256: b9c54412a6005c4793624ba56240eaa3f756793f1b872d91c8fdf4a7b68b4268

Red Hat Enterprise Linux Resilient Storage for x86_64 6

SRPM
resource-agents-3.9.2-7.el6.src.rpm SHA-256: e1ab117d20c3f2def1055142edfc01a96ac1f1f463cf8996d8596cf007362d1f
x86_64
resource-agents-3.9.2-7.el6.x86_64.rpm SHA-256: 17f266a9ddad8616d6d9968fbceb3ba220d97ec4713b8208b3df2b7e026dbd2c
resource-agents-debuginfo-3.9.2-7.el6.x86_64.rpm SHA-256: 63ce0c939ce06b70579c9f4a32b0df60d9b4e53f5a928567ed93cfc8f7f37d0f
i386
resource-agents-3.9.2-7.el6.i686.rpm SHA-256: ac491d4451604a286d6fc458c848e591471c06d6d45590e30d40d2a1e238449c
resource-agents-debuginfo-3.9.2-7.el6.i686.rpm SHA-256: b9c54412a6005c4793624ba56240eaa3f756793f1b872d91c8fdf4a7b68b4268

Red Hat Enterprise Linux High Availability (for RHEL Server) from RHUI 6

SRPM
resource-agents-3.9.2-7.el6.src.rpm SHA-256: e1ab117d20c3f2def1055142edfc01a96ac1f1f463cf8996d8596cf007362d1f
x86_64
resource-agents-3.9.2-7.el6.x86_64.rpm SHA-256: 17f266a9ddad8616d6d9968fbceb3ba220d97ec4713b8208b3df2b7e026dbd2c
resource-agents-debuginfo-3.9.2-7.el6.x86_64.rpm SHA-256: 63ce0c939ce06b70579c9f4a32b0df60d9b4e53f5a928567ed93cfc8f7f37d0f
i386
resource-agents-3.9.2-7.el6.i686.rpm SHA-256: ac491d4451604a286d6fc458c848e591471c06d6d45590e30d40d2a1e238449c
resource-agents-debuginfo-3.9.2-7.el6.i686.rpm SHA-256: b9c54412a6005c4793624ba56240eaa3f756793f1b872d91c8fdf4a7b68b4268

Red Hat Enterprise Linux Resilient Storage (for RHEL Server) from RHUI 6

SRPM
resource-agents-3.9.2-7.el6.src.rpm SHA-256: e1ab117d20c3f2def1055142edfc01a96ac1f1f463cf8996d8596cf007362d1f
x86_64
resource-agents-3.9.2-7.el6.x86_64.rpm SHA-256: 17f266a9ddad8616d6d9968fbceb3ba220d97ec4713b8208b3df2b7e026dbd2c
resource-agents-debuginfo-3.9.2-7.el6.x86_64.rpm SHA-256: 63ce0c939ce06b70579c9f4a32b0df60d9b4e53f5a928567ed93cfc8f7f37d0f
i386
resource-agents-3.9.2-7.el6.i686.rpm SHA-256: ac491d4451604a286d6fc458c848e591471c06d6d45590e30d40d2a1e238449c
resource-agents-debuginfo-3.9.2-7.el6.i686.rpm SHA-256: b9c54412a6005c4793624ba56240eaa3f756793f1b872d91c8fdf4a7b68b4268

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility