what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Red Hat Security Advisory 2012-0102-01

Red Hat Security Advisory 2012-0102-01
Posted Feb 7, 2012
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2012-0102-01 - Red Hat Network Proxy provides a mechanism for caching content, such as package updates from Red Hat or custom content created for an organization on an internal, centrally-located server. If a user submitted a system registration XML-RPC call to an RHN Proxy server and that call failed, their RHN user password was included in plain text in the error messages both stored in the server log and mailed to the server administrator. With this update, user passwords are excluded from these error messages to avoid the exposure of authentication credentials.

tags | advisory
systems | linux, redhat
advisories | CVE-2012-0059
SHA-256 | 37f7e303099d5969d003d6e0c8fbd2ff0aa151afe8c4376919c05979495ea3d8

Red Hat Security Advisory 2012-0102-01

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
Red Hat Security Advisory

Synopsis: Low: Red Hat Network Proxy spacewalk-backend security and bug fix update
Advisory ID: RHSA-2012:0102-01
Product: Red Hat Network Proxy Server
Advisory URL: https://rhn.redhat.com/errata/RHSA-2012-0102.html
Issue date: 2012-02-06
CVE Names: CVE-2012-0059
=====================================================================

1. Summary:

Updated spacewalk-backend packages that fix one security issue are now
available for Red Hat Network Proxy 5.4.

The Red Hat Security Response Team has rated this update as having low
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

2. Relevant releases/architectures:

6Server-RHNProxy - noarch
Red Hat Network Proxy 5.4 (RHEL v.5) - noarch

3. Description:

Red Hat Network (RHN) Proxy provides a mechanism for caching content, such
as package updates from Red Hat or custom content created for an
organization on an internal, centrally-located server.

If a user submitted a system registration XML-RPC call to an RHN Proxy
server (for example, by running "rhnreg_ks") and that call failed, their
RHN user password was included in plain text in the error messages both
stored in the server log and mailed to the server administrator. With this
update, user passwords are excluded from these error messages to avoid the
exposure of authentication credentials. (CVE-2012-0059)

Users of Red Hat Network Proxy are advised to upgrade to these updated
packages, which correct this issue. For this update to take effect,
Red Hat Network Proxy must be restarted. Refer to the Solution section for
details.

4. Solution:

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Run the following command to restart the Red Hat Network Proxy server:

# rhn-proxy restart

5. Bugs fixed (http://bugzilla.redhat.com/):

782819 - CVE-2012-0059 Satellite, Spacewalk: RHN user password disclosure upon failed system registration

6. Package List:

Red Hat Network Proxy 5.4 (RHEL v.5):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/RHNPROXY/SRPMS/spacewalk-backend-1.2.13-66.el5sat.src.rpm

noarch:
spacewalk-backend-1.2.13-66.el5sat.noarch.rpm
spacewalk-backend-libs-1.2.13-66.el5sat.noarch.rpm

6Server-RHNProxy:

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/RHNPROXY/SRPMS/spacewalk-backend-1.2.13-66.el6sat.src.rpm

noarch:
spacewalk-backend-1.2.13-66.el6sat.noarch.rpm
spacewalk-backend-libs-1.2.13-66.el6sat.noarch.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/#package

7. References:

https://www.redhat.com/security/data/cve/CVE-2012-0059.html
https://access.redhat.com/security/updates/classification/#low

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2012 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFPMB7cXlSAg2UNWIIRAjarAJ49MyA7u+v3Ztg50gI1h8prAxsctgCgpLrz
RopPHJnqvdyjaL+K9Yz/yD0=
=vQVT
-----END PGP SIGNATURE-----


--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
Login or Register to add favorites

File Archive:

June 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    18 Files
  • 2
    Jun 2nd
    13 Files
  • 3
    Jun 3rd
    0 Files
  • 4
    Jun 4th
    0 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    0 Files
  • 7
    Jun 7th
    0 Files
  • 8
    Jun 8th
    0 Files
  • 9
    Jun 9th
    0 Files
  • 10
    Jun 10th
    0 Files
  • 11
    Jun 11th
    0 Files
  • 12
    Jun 12th
    0 Files
  • 13
    Jun 13th
    0 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close