Address Installation issues with TIBCO Product Suite like TRA, Admin, TEA, Hawk, BW as a result of latest operating system security patches released to overcome Stack Clash vulnerability (CVE-2017-1000364) in Linux, Solaris and BSD-based systems
book
Article ID: KB0083817
calendar_today
Updated On:
Products
Versions
TIBCO Runtime Agent (TRA)
-
TIBCO Enterprise Administrator (TEA)
-
TIBCO ActiveMatrix BusinessWorks
-
Description
Problem
=======
TIBCO Product Suite (TRA, Administrator, TEA, BW, Hawk) installation does not complete and fails at ANT POST installation task on Linux based machines which are upgraded with the security patch for Stack Clash vulnerability (CVE-2017-1000364: Stack Guard flaw).
Until now, issues have been reported for the following Kernel version upgrade:
2.6.32-696.3.2
3.10.0-514.21.2.el7.x86_64
Stack Clash vulnerability CVE:
CVE-2017-1000364 for the Linux kernel.
CVE-2017-10000366 for glibc.
Issue/Introduction
Impact of latest operating system security patches released to address Stack Clash vulnerability (CVE-2017-1000364) in Linux, Solaris and BSD-based systems on TIBCO Products ike TRA,Admin,TEA,Hawk and BW.
Environment
OS: Linux, Solaris and BSD-based systems kernel version (2.6.32-696.3.2 / 3.10.0-514.21.2).
Resolution
Set the environment variable _JAVA_OPTIONS="-Xss2m" before running the Universal Installer,
The exact command to be used follows.
export _JAVA_OPTIONS="-Xss2m"
./TIBCOUniversalInstaller-lnx-x86-64.bin -console OR ./TIBCOUniversalInstaller-lnx-x86-64.bin -silent
GUI mode installation also requires the pre-environment variable setting (_JAVA_OPTIONS="-Xss2m") before running the "TIBCOUniversalInstaller-x86-64" executable.
Additional Information
Refer to article 000031544 for more information on the impact of Linux based system security patches released to address Stack Clash vulnerability (CVE-2017-1000364).