First published: Thu Feb 07 2013(Updated: )
Candlepin before 0.7.24, as used in Red Hat Subscription Asset Manager before 1.2.1, does not properly check manifest signatures, which allows local users to modify manifests.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Candlepin | <=0.7.2 | |
Candlepin | =0.4.5 | |
Candlepin | =0.4.11 | |
Candlepin | =0.4.27 | |
Candlepin | =0.5.5 | |
Candlepin | =0.6.3 | |
Red Hat Subscription Asset Manager | <=1.2.0 | |
Red Hat Subscription Asset Manager | =1.0.0 | |
Red Hat Subscription Asset Manager | =1.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-6119 is classified as a medium severity vulnerability due to its potential to allow local users to modify manifest files.
To fix CVE-2012-6119, upgrade Candlepin to version 0.7.24 or later and Red Hat Subscription Asset Manager to version 1.2.1 or later.
CVE-2012-6119 affects Candlepin versions prior to 0.7.24 and Red Hat Subscription Asset Manager versions up to 1.2.0, including specific earlier versions.
The risks include unauthorized modification of manifest files, which could lead to inconsistencies or breaches in subscription management.
Users of vulnerable versions of Candlepin and Red Hat Subscription Asset Manager are directly impacted by CVE-2012-6119.