First published: Tue Mar 26 2013(Updated: )
Red Hat Subscription Asset Manager acts as a proxy for handling<br>subscription information and software updates on client machines.<br>The latest packages for Subscription Asset Manager include a number of security<br>fixes:<br>When a Subscription Asset Manager instance is created, its configuration<br>script automatically creates an RPM of the internal subscription service <br>CA certificate. However, this RPM incorrectly created the CA certificate<br>with file permissions of 0666. This allowed other users on a client system<br>to modify the CA certificate used to trust the remote subscription server.<br>All administrators are advised to update and deploy the subscription<br>service certificate on all systems which use Subscription Asset Manager<br>as their subscription service. This procedure is described in:<br><a href="https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Subscription_Asset_Manager/1.2/html/Installation_Guide/sect-Installation_Guide-Administration-Upgrading_Subscription_Asset_Manager.html" target="_blank">https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Subscription_Asset_Manager/1.2/html/Installation_Guide/sect-Installation_Guide-Administration-Upgrading_Subscription_Asset_Manager.html</a> (CVE-2012-6116)<br>Manifest signature checking was not implemented for early versions of <br>Subscription Asset Manager. This meant that a malicious user could edit<br>a manifest file, insert arbitrary data, and successfully upload the edited<br>manifest file into the Subscription Asset Manager server. (CVE-2012-6119)<br>Ruby's documentation generator had a flaw in the way it generated HTML<br>documentation. When a Ruby application exposed its documentation<br>on a network (such as a web page), an attacker could use a specially-<br>crafted URL to open an arbitrary web script or to execute HTML code<br>within the application's user session. (CVE-2013-0256)<br>A timing attack flaw was found in the way rubygem-rack and<br>ruby193-rubygem-rack processed HMAC digests in cookies. This flaw could aid<br>an attacker using forged digital signatures to bypass authentication<br>checks. (CVE-2013-0263)<br>A flaw in rubygem-json allowed remote attacks by creating different types<br>of malicious objects. For example, it could initiate a denial of service<br>(DoS) attack through resource consumption by using a JSON document to<br>create arbitrary Ruby symbols, which were never garbage collected. It<br>could also be exploited to create internal objects which could allow a SQL<br>injection attack. (CVE-2013-0269)<br>A flaw in ActiveRecord in Ruby on Rails allowed remote attackers to<br>circumvent attribute protections and to insert their own crafted requests<br>to change protected attribute values. (CVE-2013-0276)<br>HTML markup was not properly escaped when filling in the username field in<br>the Notifications form of the Subscription Asset Manager UI. This meant<br>that HTML code used in the value was then applied in the UI page when the<br>entry was viewed. This could have allowed malicious HTML code to be<br>entered. The field value is now validated and any HTML tags are escaped.<br>(CVE-2013-1823)<br>These updated packages also include bug fixes and enhancements:<br><li> Previously, no SELinux policy for the subscription service was included</li> with the Subscription Asset Manager packages. The candlepin-selinux package<br>is now included with SELinux policies for the subscription server. <br>(BZ#906901)<br><li> When attempting to use the subscription service's CA certificate to</li> validate a manifest during import, the comparison failed. The upstream<br>subscription service which generated the manifest is a different service<br>than the local subscription service; thus, they have different CA<br>certificates. This caused importing a manifest to fail with the error<br>'archive failed signature'. This has been fixed so that the proper<br>certificate is used for verification. (BZ#918778)<br>All users of Subscription Asset Manager are recommended to update to the<br>latest packages.<br>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/candlepin | <0.7.24-1.el6_3 | 0.7.24-1.el6_3 |
redhat/katello | <1.2.1.1-1h.el6_4 | 1.2.1.1-1h.el6_4 |
redhat/katello-configure | <1.2.3.1-4h.el6_4 | 1.2.3.1-4h.el6_4 |
redhat/rubygem-actionpack | <3.0.10-12.el6cf | 3.0.10-12.el6cf |
redhat/rubygem-activemodel | <3.0.10-3.el6cf | 3.0.10-3.el6cf |
redhat/rubygem-json | <1.7.3-2.el6_3 | 1.7.3-2.el6_3 |
redhat/rubygem-nokogiri | <1.5.0-0.9.beta4.el6cf | 1.5.0-0.9.beta4.el6cf |
redhat/rubygem-rack | <1.3.0-4.el6cf | 1.3.0-4.el6cf |
redhat/rubygem-rdoc | <3.8-6.el6cf | 3.8-6.el6cf |
redhat/thumbslug | <0.0.28.1-1.el6_4 | 0.0.28.1-1.el6_4 |
redhat/candlepin | <0.7.24-1.el6_3 | 0.7.24-1.el6_3 |
redhat/candlepin-devel | <0.7.24-1.el6_3 | 0.7.24-1.el6_3 |
redhat/candlepin-selinux | <0.7.24-1.el6_3 | 0.7.24-1.el6_3 |
redhat/candlepin-tomcat6 | <0.7.24-1.el6_3 | 0.7.24-1.el6_3 |
redhat/katello-common | <1.2.1.1-1h.el6_4 | 1.2.1.1-1h.el6_4 |
redhat/katello-configure | <1.2.3.1-4h.el6_4 | 1.2.3.1-4h.el6_4 |
redhat/katello-glue-candlepin | <1.2.1.1-1h.el6_4 | 1.2.1.1-1h.el6_4 |
redhat/katello-headpin | <1.2.1.1-1h.el6_4 | 1.2.1.1-1h.el6_4 |
redhat/katello-headpin-all | <1.2.1.1-1h.el6_4 | 1.2.1.1-1h.el6_4 |
redhat/ruby-nokogiri | <1.5.0-0.9.beta4.el6cf | 1.5.0-0.9.beta4.el6cf |
redhat/rubygem-actionpack | <3.0.10-12.el6cf | 3.0.10-12.el6cf |
redhat/rubygem-activemodel | <3.0.10-3.el6cf | 3.0.10-3.el6cf |
redhat/rubygem-activemodel-doc | <3.0.10-3.el6cf | 3.0.10-3.el6cf |
redhat/rubygem-json | <1.7.3-2.el6_3 | 1.7.3-2.el6_3 |
redhat/rubygem-json-debuginfo | <1.7.3-2.el6_3 | 1.7.3-2.el6_3 |
redhat/rubygem-nokogiri | <1.5.0-0.9.beta4.el6cf | 1.5.0-0.9.beta4.el6cf |
redhat/rubygem-nokogiri-debuginfo | <1.5.0-0.9.beta4.el6cf | 1.5.0-0.9.beta4.el6cf |
redhat/rubygem-nokogiri-doc | <1.5.0-0.9.beta4.el6cf | 1.5.0-0.9.beta4.el6cf |
redhat/rubygem-rack | <1.3.0-4.el6cf | 1.3.0-4.el6cf |
redhat/rubygem-rdoc | <3.8-6.el6cf | 3.8-6.el6cf |
redhat/rubygem-rdoc-doc | <3.8-6.el6cf | 3.8-6.el6cf |
redhat/thumbslug | <0.0.28.1-1.el6_4 | 0.0.28.1-1.el6_4 |
redhat/thumbslug-selinux | <0.0.28.1-1.el6_4 | 0.0.28.1-1.el6_4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.