First published: Thu Feb 21 2013(Updated: )
Red Hat Subscription Asset Manager acts as a proxy for handling<br>subscription information and software updates on client machines.<br>It was discovered that Katello did not properly check user permissions when<br>handling certain requests. An authenticated remote attacker could use this<br>flaw to download consumer certificates or change settings of other users'<br>systems if they knew the target system's UUID. (CVE-2012-5603)<br>It was found that the<br>"/usr/share/katello/script/katello-generate-passphrase" utility, which is<br>run during the installation and configuration process, set world-readable<br>permissions on the "/etc/katello/secure/passphrase" file. A local attacker<br>could use this flaw to obtain the passphrase for Katello, giving them<br>access to information they would otherwise not have access to.<br>(CVE-2012-5561)<br>Note: After installing this update, ensure the<br>"/etc/katello/secure/passphrase" file is owned by the root user and group<br>and mode 0750 permissions. Sites should also consider re-creating the<br>Katello passphrase as this issue exposed it to local users.<br>Three flaws were found in rubygem-rack. A remote attacker could use these<br>flaws to perform a denial of service attack against applications using<br>rubygem-rack. (CVE-2012-6109, CVE-2013-0183, CVE-2013-0184)<br>It was found that ruby_parser from rubygem-ruby_parser created a temporary<br>file in an insecure way. A local attacker could use this flaw to perform a<br>symbolic link attack, overwriting arbitrary files accessible to the<br>application using ruby_parser. (CVE-2013-0162)<br>The CVE-2012-5603 issue was discovered by Lukas Zapletal of Red Hat;<br>CVE-2012-5561 was discovered by Aaron Weitekamp of the Red Hat Cloud<br>Quality Engineering team; and CVE-2013-0162 was discovered by Michael<br>Scherer of the Red Hat Regional IT team.<br>These updated Subscription Asset Manager packages include a number of bug<br>fixes and enhancements. Space precludes documenting all of these changes<br>in this advisory. Refer to the Red Hat Subscription Asset Manager 1.2<br>Release Notes for information about these changes:<br><a href="https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Subscription_Asset_Manager/1.2/html/Release_Notes/index.html" target="_blank">https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Subscription_Asset_Manager/1.2/html/Release_Notes/index.html</a> All users of Red Hat Subscription Asset Manager are advised to upgrade to<br>these updated packages, which fix these issues and add various<br>enhancements.<br>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/apache-commons-codec | <1.7-2.el6_3 | 1.7-2.el6_3 |
redhat/apache-mime4j | <0.6-4_redhat_1.ep6.el6.1 | 0.6-4_redhat_1.ep6.el6.1 |
redhat/candlepin | <0.7.23-1.el6_3 | 0.7.23-1.el6_3 |
redhat/elasticsearch | <0.19.9-5.el6_3 | 0.19.9-5.el6_3 |
redhat/katello | <1.2.1-15h.el6_3 | 1.2.1-15h.el6_3 |
redhat/katello-certs-tools | <1.2.1-1h.el6_3 | 1.2.1-1h.el6_3 |
redhat/katello-cli | <1.2.1-12h.el6_3 | 1.2.1-12h.el6_3 |
redhat/katello-configure | <1.2.3-3h.el6_3 | 1.2.3-3h.el6_3 |
redhat/katello-selinux | <1.2.1-2h.el6_3 | 1.2.1-2h.el6_3 |
redhat/lucene3 | <3.6.1-10h.el6_3 | 3.6.1-10h.el6_3 |
redhat/puppet | <2.6.17-2.el6cf | 2.6.17-2.el6cf |
redhat/quartz | <2.1.5-4.el6_3 | 2.1.5-4.el6_3 |
redhat/rubygem-activesupport | <3.0.10-10.el6cf | 3.0.10-10.el6cf |
redhat/rubygem-apipie-rails | <0.0.12-2.el6cf | 0.0.12-2.el6cf |
redhat/rubygem-mail | <2.3.0-3.el6cf | 2.3.0-3.el6cf |
redhat/rubygem-rack | <1.3.0-3.el6cf | 1.3.0-3.el6cf |
redhat/sigar | <1.6.5-0.12.git58097d9h.el6_3 | 1.6.5-0.12.git58097d9h.el6_3 |
redhat/snappy-java | <1.0.4-2.el6_3 | 1.0.4-2.el6_3 |
redhat/thumbslug | <0.0.28-1.el6_3 | 0.0.28-1.el6_3 |
redhat/apache-commons-codec | <1.7-2.el6_3 | 1.7-2.el6_3 |
redhat/apache-commons-codec-debuginfo | <1.7-2.el6_3 | 1.7-2.el6_3 |
redhat/apache-mime4j | <0.6-4_redhat_1.ep6.el6.1 | 0.6-4_redhat_1.ep6.el6.1 |
redhat/apache-mime4j-javadoc | <0.6-4_redhat_1.ep6.el6.1 | 0.6-4_redhat_1.ep6.el6.1 |
redhat/candlepin | <0.7.23-1.el6_3 | 0.7.23-1.el6_3 |
redhat/candlepin-devel | <0.7.23-1.el6_3 | 0.7.23-1.el6_3 |
redhat/candlepin-selinux | <0.7.23-1.el6_3 | 0.7.23-1.el6_3 |
redhat/candlepin-tomcat6 | <0.7.23-1.el6_3 | 0.7.23-1.el6_3 |
redhat/elasticsearch | <0.19.9-5.el6_3 | 0.19.9-5.el6_3 |
redhat/katello-certs-tools | <1.2.1-1h.el6_3 | 1.2.1-1h.el6_3 |
redhat/katello-cli | <1.2.1-12h.el6_3 | 1.2.1-12h.el6_3 |
redhat/katello-cli-common | <1.2.1-12h.el6_3 | 1.2.1-12h.el6_3 |
redhat/katello-common | <1.2.1-15h.el6_3 | 1.2.1-15h.el6_3 |
redhat/katello-configure | <1.2.3-3h.el6_3 | 1.2.3-3h.el6_3 |
redhat/katello-glue-candlepin | <1.2.1-15h.el6_3 | 1.2.1-15h.el6_3 |
redhat/katello-headpin | <1.2.1-15h.el6_3 | 1.2.1-15h.el6_3 |
redhat/katello-headpin-all | <1.2.1-15h.el6_3 | 1.2.1-15h.el6_3 |
redhat/katello-selinux | <1.2.1-2h.el6_3 | 1.2.1-2h.el6_3 |
redhat/lucene3 | <3.6.1-10h.el6_3 | 3.6.1-10h.el6_3 |
redhat/lucene3-contrib | <3.6.1-10h.el6_3 | 3.6.1-10h.el6_3 |
redhat/puppet | <2.6.17-2.el6cf | 2.6.17-2.el6cf |
redhat/puppet-server | <2.6.17-2.el6cf | 2.6.17-2.el6cf |
redhat/quartz | <2.1.5-4.el6_3 | 2.1.5-4.el6_3 |
redhat/rubygem-activesupport | <3.0.10-10.el6cf | 3.0.10-10.el6cf |
redhat/rubygem-apipie-rails | <0.0.12-2.el6cf | 0.0.12-2.el6cf |
redhat/rubygem-mail | <2.3.0-3.el6cf | 2.3.0-3.el6cf |
redhat/rubygem-mail-doc | <2.3.0-3.el6cf | 2.3.0-3.el6cf |
redhat/rubygem-rack | <1.3.0-3.el6cf | 1.3.0-3.el6cf |
redhat/sigar | <1.6.5-0.12.git58097d9h.el6_3 | 1.6.5-0.12.git58097d9h.el6_3 |
redhat/sigar-debuginfo | <1.6.5-0.12.git58097d9h.el6_3 | 1.6.5-0.12.git58097d9h.el6_3 |
redhat/sigar-java | <1.6.5-0.12.git58097d9h.el6_3 | 1.6.5-0.12.git58097d9h.el6_3 |
redhat/snappy-java | <1.0.4-2.el6_3 | 1.0.4-2.el6_3 |
redhat/snappy-java-debuginfo | <1.0.4-2.el6_3 | 1.0.4-2.el6_3 |
redhat/thumbslug | <0.0.28-1.el6_3 | 0.0.28-1.el6_3 |
redhat/thumbslug-selinux | <0.0.28-1.el6_3 | 0.0.28-1.el6_3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.