First published: Fri Apr 23 2010(Updated: )
It was found that the yum-rhn-plugin caches sensitive authentication information in the world-readable /var/spool/up2date/loginAuth.pkl file. This information could be used to download packages from Red Hat Network (Hosted or Satellite) or otherwise manipulate the package list associated with the system's profile, which could possibly prevent new errata from being installed.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat RHN Client Tools | ||
Red Hat YUM RHN Plugin | ||
Fedora | ||
Red Hat Enterprise Linux | =5 | |
Red Hat Enterprise Linux | =5-ga | |
Red Hat Enterprise Linux | =5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-1439 has a medium severity level due to the exposure of sensitive authentication information.
To fix CVE-2010-1439, you should ensure that the /var/spool/up2date/loginAuth.pkl file has proper permissions and restrict access to it.
CVE-2010-1439 affects the Red Hat Yum-rhn-plugin.
The potential risks of CVE-2010-1439 include unauthorized downloading of packages and manipulation of the package list.
If you are using an affected version of the yum-rhn-plugin without the necessary security measures, CVE-2010-1439 could still be a concern.