RSA Identity Governance & Lifecycle Capacity Overflow Attack Vulnerability
Originally Published: 2018-04-12
Article Number
Applies To
| RSA Product Name | Versions | Platforms |
|---|---|---|
| RSA Identity Governance & Lifecycle | 7.1 | RSA hardware appliance Virtual application (OVA) with RSA-provided database Virtual application (OVA) with customer-supplied database |
| RSA Identity Governance & Lifecycle | 7.0.2 7.0.1 | RSA hardware appliance |
| RSA Via Lifecycle & Governance | 7.0 | RSA hardware appliance |
Article Summary
Alert Impact
Impacted - Apply RSA Remedy
Alert Impact Explanation
Resolution
The following steps can be taken to automatically bind /var/tmp to /tmp at system boot time.
- Log in to the appliance using root
- Search /etc/fstab to check that /var/tmp is not already bound to another directory. Issue the following command:
grep /var/tmp /etc/fstab
If the grep command returns no output, or returns only lines that do not "bind" /var/tmp, continue with step 3 below.
If the grep command returns an error, or finds a line that "binds" /var/tmp, do not continue.
If the grep command returns an error, or finds a line that "binds" /var/tmp, do not continue.
- Use the commands below to backup the current /etc/fstab file. Each command should return no output and no errors:
mkdir /tmp/ACM-83001-backup cp /etc/fstab /tmp/ACM-83001-backup
- Use the following command to add a line to file /etc/fstab to mount /tmp to /var/tmp. The command should return no output and no errors.
echo "/tmp /var/tmp none bind 0 0" >> /etc/fstab
- Check that file /etc/fstab has been modified correctly by typing the command:
cat /etc/fstab
The cat command should show that the last line in /etc/fstab is now:
/tmp /var/tmp none bind 0 0
- Reboot the appliance.
Notes
Reboot Required
A reboot is required to perform the mount because there are many lock files and communication-related temporary files maintained in /var/tmp. Running an explicit mount command in a running system may lead to issues when a local Oracle database is in use.Backout
Should this change need to be backed out, the original /etc/fstab file can be copied from the backup directory to its original location with the following command:cp /tmp/ACM-83001-backup/fstab /etc
Disclaimer
Related Articles
User getting SOAP Login errors in application when sure about SOAP Login name and Password 73Number of Views How to enable the SSO Configuration menu in the RSA Mobile Lock Console 280Number of Views Self-Service Console doesn't display On-Demand Authentication (ODA) link for RSA Authentication Manager 8.x 239Number of Views Can't Attach RSA Authentication Manager 8.1 replica when Primary has migrated data. 466Number of Views How can I re-enable my RSA Community and myRSA account if it becomes disabled? 142Number of Views
Trending Articles
Passwordless Authentication in Windows MFA Agent for Active Directory – Quick Setup Guide RSA Authentication Manager 8.9 Release Notes (January 2026) RSA Authentication Manager Upgrade Process RSA Authentication Manager 8.7 SP2 Setup and Configuration Guide An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x
Don't see what you're looking for?