Moderate: MRG Grid security, bug fix, and enhancement update

Related Vulnerabilities: CVE-2011-4930   CVE-2011-4930  

Synopsis

Moderate: MRG Grid security, bug fix, and enhancement update

Type/Severity

Security Advisory: Moderate

Topic

Updated Grid component packages that fix multiple security issues, multiple
bugs, and add various enhancements are now available for Red Hat Enterprise
MRG 2 for Red Hat Enterprise Linux 5.

The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

Description

Red Hat Enterprise MRG (Messaging, Realtime, and Grid) is a next-generation
IT infrastructure for enterprise computing. MRG offers increased
performance, reliability, interoperability, and faster computing for
enterprise customers.

MRG Grid provides high-throughput computing and enables enterprises to
achieve higher peak computing capacity as well as improved infrastructure
utilization by leveraging their existing technology to build high
performance grids. MRG Grid provides a job-queueing mechanism, scheduling
policy, and a priority scheme, as well as resource monitoring and resource
management. Users submit their jobs to MRG Grid, where they are placed into
a queue. MRG Grid then chooses when and where to run the jobs based upon a
policy, carefully monitors their progress, and ultimately informs the user
upon completion.

Multiple format string flaws were found in Condor. An authenticated Condor
service user could use these flaws to prevent other jobs from being
scheduled and executed, crash the condor_schedd daemon, or, possibly,
execute arbitrary code with the privileges of the "condor" user.
(CVE-2011-4930)

These updated packages for Red Hat Enterprise Linux 5 provide enhancements
and bug fixes for the Grid component of MRG. Some select enhancements and
fixes include:

  • Addition of -sort option to condor_status
  • Customized output from condor_q -run for EC2 jobs
  • Enhanced the summary line provided by condor_q
  • Improved Collector performance around blocking network calls
  • Fixed a memory leak associated with python-psycopg2 hit by cumin-data

Space precludes documenting all of these changes in this advisory. Refer to
the Red Hat Enterprise MRG 2 Technical Notes document for information on
these changes:

https://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_MRG/2/html/Technical_Notes/index.html

All users of the Grid capabilities of Red Hat Enterprise MRG 2 are advised
to upgrade to these updated packages, which resolve the issues and add the
enhancements noted in the Red Hat Enterprise MRG 2 Technical Notes.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Affected Products

  • MRG Grid from RHUI 2 for RHEL 5 x86_64
  • Red Hat Enterprise MRG Messaging 2 for RHEL 5 x86_64
  • Red Hat Enterprise MRG Messaging 2 for RHEL 5 i386
  • MRG Grid 2 for RHEL 5 x86_64
  • MRG Grid 2 for RHEL 5 i386

Fixes

  • BZ - 613931 - cannot delete user name from condor_userprio -all and wrong resource number
  • BZ - 748735 - Cumin generates application error: TypeError: len() of unsized object from cumin/objectframe.py, line 298
  • BZ - 750063 - condor_q -run w/ EC2 should display EC2RemoteVirtualMachine
  • BZ - 751072 - Some condor_* commands with valid parameter '-help' return non zero exit code
  • BZ - 751779 - Up-time display for Scheduler object is not dd:hh:mm
  • BZ - 751834 - Hardcoded resource URL (ec2.amazonaws.com)
  • BZ - 752322 - Suspended jobs should be displayed in condor_q summary line
  • BZ - 753829 - Dag submissions have incorrect job totals from plugin publisher
  • BZ - 754202 - History file and index management during condor_job_server runtime
  • BZ - 756401 - SPQR defaults to PLAIN authentication if a username is specified
  • BZ - 756402 - SPQR does not support every authentication mechanism available in qmfengine
  • BZ - 759154 - Script sshd.sh print 0 as error code of some utilities instead of returned code
  • BZ - 759200 - Memory leak in python-psycopg2
  • BZ - 759433 - OpenMPI job fails when sshd.sh putting identity keys back.
  • BZ - 759548 - CVE-2011-4930 Condor: Multiple format string flaws
  • BZ - 761165 - EC2AvailabilityZone misspelled
  • BZ - 761588 - condor_schedd.init script isn't removing pidfile
  • BZ - 765713 - Memory usage graph - gray collor
  • BZ - 765846 - Submit VM job - doesn't work
  • BZ - 771642 - Cumin generates application error: AttributeError: 'int' object has no attribute 'name', wallabyoperations.py line 420
  • BZ - 773680 - Released job doesn't start
  • BZ - 782485 - Exception on Inventory page after wallaby remove-node
  • BZ - 782902 - Inventory page with sesame and wallaby data can see values disappear temporarily

CVEs

References