====================================================================                   Red Hat Security Advisory

Synopsis:          Low: ibutils security and bug fix update
Advisory ID:       RHSA-2012:0311-03
Product:           Red Hat Enterprise Linux
Advisory URL:      https://access.redhat.com/errata/RHSA-2012:0311.html
Issue date:        2012-02-21
CVE Names:         CVE-2008-3277 
====================================================================
1. Summary:

Updated ibutils packages that fix one security issue and one bug are now
available for Red Hat Enterprise Linux 5.

The Red Hat Security Response Team has rated this update as having low
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

2. Relevant releases/architectures:

RHEL Desktop Workstation (v. 5 client) - i386, x86_64
Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, x86_64

3. Description:

The ibutils packages provide InfiniBand network and path diagnostics.

It was found that the ibmssh executable had an insecure relative RPATH
(runtime library search path) set in the ELF (Executable and Linking
Format) header. A local user able to convince another user to run ibmssh in
an attacker-controlled directory could run arbitrary code with the
privileges of the victim. (CVE-2008-3277)

This update also fixes the following bug:

* Under certain circumstances, the "ibdiagnet -r" command could suffer from
memory corruption and terminate with a "double free or corruption" message
and a backtrace. With this update, the correct memory management function
is used to prevent the corruption. (BZ#711779)

All users of ibutils are advised to upgrade to these updated packages,
which contain backported patches to correct these issues.

4. Solution:

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

5. Bugs fixed (http://bugzilla.redhat.com/):

457935 - CVE-2008-3277 ibutils: insecure relative RPATH

6. Package List:

RHEL Desktop Workstation (v. 5 client):

Source:

i386:
ibutils-1.2-11.2.el5.i386.rpm
ibutils-debuginfo-1.2-11.2.el5.i386.rpm
ibutils-devel-1.2-11.2.el5.i386.rpm
ibutils-libs-1.2-11.2.el5.i386.rpm

x86_64:
ibutils-1.2-11.2.el5.x86_64.rpm
ibutils-debuginfo-1.2-11.2.el5.i386.rpm
ibutils-debuginfo-1.2-11.2.el5.x86_64.rpm
ibutils-devel-1.2-11.2.el5.i386.rpm
ibutils-devel-1.2-11.2.el5.x86_64.rpm
ibutils-libs-1.2-11.2.el5.i386.rpm
ibutils-libs-1.2-11.2.el5.x86_64.rpm

Red Hat Enterprise Linux (v. 5 server):

Source:

i386:
ibutils-1.2-11.2.el5.i386.rpm
ibutils-debuginfo-1.2-11.2.el5.i386.rpm
ibutils-devel-1.2-11.2.el5.i386.rpm
ibutils-libs-1.2-11.2.el5.i386.rpm

ia64:
ibutils-1.2-11.2.el5.ia64.rpm
ibutils-debuginfo-1.2-11.2.el5.ia64.rpm
ibutils-devel-1.2-11.2.el5.ia64.rpm
ibutils-libs-1.2-11.2.el5.ia64.rpm

ppc:
ibutils-1.2-11.2.el5.ppc.rpm
ibutils-debuginfo-1.2-11.2.el5.ppc.rpm
ibutils-devel-1.2-11.2.el5.ppc.rpm
ibutils-libs-1.2-11.2.el5.ppc.rpm

x86_64:
ibutils-1.2-11.2.el5.x86_64.rpm
ibutils-debuginfo-1.2-11.2.el5.i386.rpm
ibutils-debuginfo-1.2-11.2.el5.x86_64.rpm
ibutils-devel-1.2-11.2.el5.i386.rpm
ibutils-devel-1.2-11.2.el5.x86_64.rpm
ibutils-libs-1.2-11.2.el5.i386.rpm
ibutils-libs-1.2-11.2.el5.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/#package

7. References:

https://www.redhat.com/security/data/cve/CVE-2008-3277.html
https://access.redhat.com/security/updates/classification/#low

8. Contact:

The Red Hat security contact is .  More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2012 Red Hat, Inc.

Red Hat: 2012:0311-03: ibutils: Low Advisory

Updated ibutils packages that fix one security issue and one bug are now available for Red Hat Enterprise Linux 5

Summary

The ibutils packages provide InfiniBand network and path diagnostics.
It was found that the ibmssh executable had an insecure relative RPATH (runtime library search path) set in the ELF (Executable and Linking Format) header. A local user able to convince another user to run ibmssh in an attacker-controlled directory could run arbitrary code with the privileges of the victim. (CVE-2008-3277)
This update also fixes the following bug:
* Under certain circumstances, the "ibdiagnet -r" command could suffer from memory corruption and terminate with a "double free or corruption" message and a backtrace. With this update, the correct memory management function is used to prevent the corruption. (BZ#711779)
All users of ibutils are advised to upgrade to these updated packages, which contain backported patches to correct these issues.



Summary


Solution

Before applying this update, make sure all previously-released errata relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259

References

https://www.redhat.com/security/data/cve/CVE-2008-3277.html https://access.redhat.com/security/updates/classification/#low

Package List

RHEL Desktop Workstation (v. 5 client):
Source:
i386: ibutils-1.2-11.2.el5.i386.rpm ibutils-debuginfo-1.2-11.2.el5.i386.rpm ibutils-devel-1.2-11.2.el5.i386.rpm ibutils-libs-1.2-11.2.el5.i386.rpm
x86_64: ibutils-1.2-11.2.el5.x86_64.rpm ibutils-debuginfo-1.2-11.2.el5.i386.rpm ibutils-debuginfo-1.2-11.2.el5.x86_64.rpm ibutils-devel-1.2-11.2.el5.i386.rpm ibutils-devel-1.2-11.2.el5.x86_64.rpm ibutils-libs-1.2-11.2.el5.i386.rpm ibutils-libs-1.2-11.2.el5.x86_64.rpm
Red Hat Enterprise Linux (v. 5 server):
Source:
i386: ibutils-1.2-11.2.el5.i386.rpm ibutils-debuginfo-1.2-11.2.el5.i386.rpm ibutils-devel-1.2-11.2.el5.i386.rpm ibutils-libs-1.2-11.2.el5.i386.rpm
ia64: ibutils-1.2-11.2.el5.ia64.rpm ibutils-debuginfo-1.2-11.2.el5.ia64.rpm ibutils-devel-1.2-11.2.el5.ia64.rpm ibutils-libs-1.2-11.2.el5.ia64.rpm
ppc: ibutils-1.2-11.2.el5.ppc.rpm ibutils-debuginfo-1.2-11.2.el5.ppc.rpm ibutils-devel-1.2-11.2.el5.ppc.rpm ibutils-libs-1.2-11.2.el5.ppc.rpm
x86_64: ibutils-1.2-11.2.el5.x86_64.rpm ibutils-debuginfo-1.2-11.2.el5.i386.rpm ibutils-debuginfo-1.2-11.2.el5.x86_64.rpm ibutils-devel-1.2-11.2.el5.i386.rpm ibutils-devel-1.2-11.2.el5.x86_64.rpm ibutils-libs-1.2-11.2.el5.i386.rpm ibutils-libs-1.2-11.2.el5.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package


Severity
Advisory ID: RHSA-2012:0311-03
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2012:0311.html
Issued Date: : 2012-02-21
CVE Names: CVE-2008-3277

Topic

Updated ibutils packages that fix one security issue and one bug are nowavailable for Red Hat Enterprise Linux 5.The Red Hat Security Response Team has rated this update as having lowsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,which gives a detailed severity rating, is available from the CVE link inthe References section.


Topic


 

Relevant Releases Architectures

RHEL Desktop Workstation (v. 5 client) - i386, x86_64

Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, x86_64


Bugs Fixed

457935 - CVE-2008-3277 ibutils: insecure relative RPATH


Related News