what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Red Hat Security Advisory 2016-0174-01

Red Hat Security Advisory 2016-0174-01
Posted Feb 15, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-0174-01 - Red Hat Satellite is a system management solution that allows organizations to configure and maintain their systems without the necessity to provide public Internet access to their servers or other client systems. It performs provisioning and configuration management of predefined standard operating environments. A stored cross-site scripting flaw was found in the smart class parameters/variables field. By sending a specially crafted request to Satellite, a remote, authenticated attacker could embed HTML content into the stored data, allowing them to inject malicious content into the web page that is used to view that data.

tags | advisory, remote, web, xss
systems | linux, redhat
advisories | CVE-2015-7518
SHA-256 | bdaf1fecf6f3ad8cb6269b3d5e444878cea3b64aebc3ccb2a48bd29873d42192

Red Hat Security Advisory 2016-0174-01

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
Red Hat Security Advisory

Synopsis: Moderate: Satellite 6.1.7 security, bug and enhancement fix update
Advisory ID: RHSA-2016:0174-01
Product: Red Hat Satellite 6
Advisory URL: https://access.redhat.com/errata/RHSA-2016:0174
Issue date: 2016-02-15
CVE Names: CVE-2015-7518
=====================================================================

1. Summary:

Updated Satellite 6.1 packages that fix one security issue, add one
enhancement, and fix several bugs are available for Satellite 6.1.7.

Red Hat Product Security has rated this update as having Moderate
Security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

2. Relevant releases/architectures:

Red Hat Satellite 6.1 - noarch
Red Hat Satellite Capsule 6.1 - noarch

3. Description:

Red Hat Satellite is a system management solution that allows
organizations to configure and maintain their systems without the
necessity to provide public Internet access to their servers or
other client systems. It performs provisioning and configuration
management of predefined standard operating environments.

A stored cross-site scripting (XSS) flaw was found in the smart
class parameters/variables field. By sending a specially crafted
request to Satellite, a remote, authenticated attacker could embed
HTML content into the stored data, allowing them to inject malicious
content into the web page that is used to view that data.
(CVE-2015-7518)

This update also fixes the following bugs:

* New subscription rules for developer subscriptions caused manifest
imports into Satellite to fail. The subscription engine has been
updated to handle these new subscription rules correctly.
(BZ#1301812)

* A heavy load on content synchronization caused tasks to appear as
if they had not stopped. The content engine has been updated to
handle these messages with varying amounts of load. (BZ#1300811)

* Deleted directories in the /var/lib/pulp/ directory caused errors
related to "missing symlinks" during content synchronization. The
code has been updated to notice deleted directories, and recreate
them as necessary. (BZ#1288855, BZ#1276911)

* The networking API returned a JSON output which did not contain
the identifier of the interface. This data is critical for
scripting, and has been added to the API response. (BZ#1282539)

* When provisioning against Red Hat Enterprise Virtualization
(RHEV), the operating system information was not passed, causing
provisioning to fail. The interface to RHEV has been updated to
resolve this bug. (BZ#1279631)

* Incremental updates initiated from the command line were failing
with an "ID not found" error. The command line interface has been
patched to provide the correct ID, thus fixing this bug.
(BZ#1259057)

* Satellite used a large number of inodes when publishing a content.
The internal file handling has been improved to reduce the number of
symlinks and inodes required. (BZ#1244130)

* Provisioning on VMWare with multiple NICs was not handling labels
correctly. The interface to VMWare has been improved to handle this
situation correctly. (BZ#1197156)

* Previously, failed synchronization tasks on a Capsule which were
not reported correctly, and appeared as successful in the web UI.
The error handing logic has been improved to display the true state
of the task. (BZ#1215838)

* Satellite synchronized duplicate packages with the same epoch,
name, version, release, and architecture (ENVRA), but which were
signed by different checksums. This caused issues for clients
attempting to install from the repository. The code was updated to
respect the primary metadata, and only download a single package.
(BZ#1132659)

Users of Red Hat Satellite are advised to upgrade to these updated
packages, which contain backported patches to correct these issues
and add this enhancement.

4. Solution:

Before applying this update, make sure all previously released
errata relevant to your system have been applied.

To update this system to include these fixes, ensure your system has
access to the latest Red Hat packages. For instructions on how to
apply this update, refer to:

https://access.redhat.com/articles/11258

Then re-run the installer to complete the upgrade:

# katello-installer --upgrade

or

# capsule-installer --upgrade

5. Bugs fixed (https://bugzilla.redhat.com/):

1132659 - better handle repositories with duplicate NVREAs
1215838 - Client Errata Install Tasks containing errors are still marked as a Success
1244130 - Pulp nodes (for capsules) disk usage uses O(N) inodes
1259057 - hammer incremental update is broken
1276911 - Capsule fails to publish kickstart tree due to missing target of symlink
1279631 - Network Based Provisioning of New Host in RHEV fails with "No bootable device."
1282539 - Interfaces API output is missing 'identifier'
1285728 - CVE-2015-7518 foreman: Stored XSS vulnerability in smart class parameters/variables
1288855 - Custom product content is not syncing to capsule
1300811 - Unacked messages in resource_manager queue
1301812 - Candlepin is failing on updating and importing manifest

6. Package List:

Red Hat Satellite Capsule 6.1:

Source:
foreman-1.7.2.53-1.el6_6sat.src.rpm
katello-installer-base-2.3.25-1.el6.src.rpm
pulp-2.6.0.20-1.el6.src.rpm
pulp-puppet-2.6.0.20-1.el6.src.rpm
pulp-rpm-2.6.0.20-1.el6.src.rpm
python-kombu-3.0.24-11.pulp.el6.src.rpm

noarch:
capsule-installer-2.3.25-1.el6.noarch.rpm
foreman-debug-1.7.2.53-1.el6_6sat.noarch.rpm
katello-installer-base-2.3.25-1.el6.noarch.rpm
pulp-admin-client-2.6.0.20-1.el6.noarch.rpm
pulp-nodes-child-2.6.0.20-1.el6.noarch.rpm
pulp-nodes-common-2.6.0.20-1.el6.noarch.rpm
pulp-nodes-parent-2.6.0.20-1.el6.noarch.rpm
pulp-puppet-admin-extensions-2.6.0.20-1.el6.noarch.rpm
pulp-puppet-plugins-2.6.0.20-1.el6.noarch.rpm
pulp-rpm-admin-extensions-2.6.0.20-1.el6.noarch.rpm
pulp-rpm-handlers-2.6.0.20-1.el6.noarch.rpm
pulp-rpm-plugins-2.6.0.20-1.el6.noarch.rpm
pulp-selinux-2.6.0.20-1.el6.noarch.rpm
pulp-server-2.6.0.20-1.el6.noarch.rpm
python-kombu-3.0.24-11.pulp.el6.noarch.rpm
python-pulp-agent-lib-2.6.0.20-1.el6.noarch.rpm
python-pulp-bindings-2.6.0.20-1.el6.noarch.rpm
python-pulp-client-lib-2.6.0.20-1.el6.noarch.rpm
python-pulp-common-2.6.0.20-1.el6.noarch.rpm
python-pulp-puppet-common-2.6.0.20-1.el6.noarch.rpm
python-pulp-rpm-common-2.6.0.20-1.el6.noarch.rpm

Red Hat Satellite 6.1:

Source:
candlepin-0.9.49.11-1.el6.src.rpm
foreman-1.7.2.53-1.el6_6sat.src.rpm
katello-installer-base-2.3.25-1.el6.src.rpm
pulp-2.6.0.20-1.el6.src.rpm
pulp-puppet-2.6.0.20-1.el6.src.rpm
pulp-rpm-2.6.0.20-1.el6.src.rpm
python-kombu-3.0.24-11.pulp.el6.src.rpm
ruby193-rubygem-fog-1.24.1-1.el6_6sat.src.rpm
ruby193-rubygem-katello-2.2.0.83-1.el6_6sat.src.rpm
rubygem-hammer_cli_katello-0.0.7.21-1.el6.src.rpm

noarch:
candlepin-0.9.49.11-1.el6.noarch.rpm
candlepin-selinux-0.9.49.11-1.el6.noarch.rpm
candlepin-tomcat6-0.9.49.11-1.el6.noarch.rpm
foreman-1.7.2.53-1.el6_6sat.noarch.rpm
foreman-compute-1.7.2.53-1.el6_6sat.noarch.rpm
foreman-debug-1.7.2.53-1.el6_6sat.noarch.rpm
foreman-gce-1.7.2.53-1.el6_6sat.noarch.rpm
foreman-libvirt-1.7.2.53-1.el6_6sat.noarch.rpm
foreman-ovirt-1.7.2.53-1.el6_6sat.noarch.rpm
foreman-postgresql-1.7.2.53-1.el6_6sat.noarch.rpm
foreman-vmware-1.7.2.53-1.el6_6sat.noarch.rpm
katello-installer-2.3.25-1.el6.noarch.rpm
katello-installer-base-2.3.25-1.el6.noarch.rpm
pulp-admin-client-2.6.0.20-1.el6.noarch.rpm
pulp-nodes-child-2.6.0.20-1.el6.noarch.rpm
pulp-nodes-common-2.6.0.20-1.el6.noarch.rpm
pulp-nodes-parent-2.6.0.20-1.el6.noarch.rpm
pulp-puppet-admin-extensions-2.6.0.20-1.el6.noarch.rpm
pulp-puppet-plugins-2.6.0.20-1.el6.noarch.rpm
pulp-puppet-tools-2.6.0.20-1.el6.noarch.rpm
pulp-rpm-admin-extensions-2.6.0.20-1.el6.noarch.rpm
pulp-rpm-handlers-2.6.0.20-1.el6.noarch.rpm
pulp-rpm-plugins-2.6.0.20-1.el6.noarch.rpm
pulp-selinux-2.6.0.20-1.el6.noarch.rpm
pulp-server-2.6.0.20-1.el6.noarch.rpm
python-kombu-3.0.24-11.pulp.el6.noarch.rpm
python-pulp-agent-lib-2.6.0.20-1.el6.noarch.rpm
python-pulp-bindings-2.6.0.20-1.el6.noarch.rpm
python-pulp-client-lib-2.6.0.20-1.el6.noarch.rpm
python-pulp-common-2.6.0.20-1.el6.noarch.rpm
python-pulp-puppet-common-2.6.0.20-1.el6.noarch.rpm
python-pulp-rpm-common-2.6.0.20-1.el6.noarch.rpm
ruby193-rubygem-fog-1.24.1-1.el6_6sat.noarch.rpm
ruby193-rubygem-katello-2.2.0.83-1.el6_6sat.noarch.rpm
rubygem-hammer_cli_katello-0.0.7.21-1.el6.noarch.rpm

Red Hat Satellite Capsule 6.1:

Source:
foreman-1.7.2.53-1.el7sat.src.rpm
katello-installer-base-2.3.25-1.el7sat.src.rpm
pulp-2.6.0.20-1.el7sat.src.rpm
pulp-puppet-2.6.0.20-1.el7sat.src.rpm
pulp-rpm-2.6.0.20-1.el7sat.src.rpm
python-kombu-3.0.24-11.pulp.el7sat.src.rpm

noarch:
capsule-installer-2.3.25-1.el7sat.noarch.rpm
foreman-debug-1.7.2.53-1.el7sat.noarch.rpm
katello-installer-base-2.3.25-1.el7sat.noarch.rpm
pulp-admin-client-2.6.0.20-1.el7sat.noarch.rpm
pulp-nodes-child-2.6.0.20-1.el7sat.noarch.rpm
pulp-nodes-common-2.6.0.20-1.el7sat.noarch.rpm
pulp-nodes-parent-2.6.0.20-1.el7sat.noarch.rpm
pulp-puppet-admin-extensions-2.6.0.20-1.el7sat.noarch.rpm
pulp-puppet-plugins-2.6.0.20-1.el7sat.noarch.rpm
pulp-rpm-admin-extensions-2.6.0.20-1.el7sat.noarch.rpm
pulp-rpm-handlers-2.6.0.20-1.el7sat.noarch.rpm
pulp-rpm-plugins-2.6.0.20-1.el7sat.noarch.rpm
pulp-selinux-2.6.0.20-1.el7sat.noarch.rpm
pulp-server-2.6.0.20-1.el7sat.noarch.rpm
python-kombu-3.0.24-11.pulp.el7sat.noarch.rpm
python-pulp-agent-lib-2.6.0.20-1.el7sat.noarch.rpm
python-pulp-bindings-2.6.0.20-1.el7sat.noarch.rpm
python-pulp-client-lib-2.6.0.20-1.el7sat.noarch.rpm
python-pulp-common-2.6.0.20-1.el7sat.noarch.rpm
python-pulp-puppet-common-2.6.0.20-1.el7sat.noarch.rpm
python-pulp-rpm-common-2.6.0.20-1.el7sat.noarch.rpm

Red Hat Satellite 6.1:

Source:
candlepin-0.9.49.11-1.el7.src.rpm
foreman-1.7.2.53-1.el7sat.src.rpm
katello-installer-base-2.3.25-1.el7sat.src.rpm
pulp-2.6.0.20-1.el7sat.src.rpm
pulp-puppet-2.6.0.20-1.el7sat.src.rpm
pulp-rpm-2.6.0.20-1.el7sat.src.rpm
python-kombu-3.0.24-11.pulp.el7sat.src.rpm
ruby193-rubygem-fog-1.24.1-1.el7sat.src.rpm
ruby193-rubygem-katello-2.2.0.83-1.el7sat.src.rpm
rubygem-hammer_cli_katello-0.0.7.21-1.el7sat.src.rpm

noarch:
candlepin-0.9.49.11-1.el7.noarch.rpm
candlepin-selinux-0.9.49.11-1.el7.noarch.rpm
candlepin-tomcat-0.9.49.11-1.el7.noarch.rpm
foreman-1.7.2.53-1.el7sat.noarch.rpm
foreman-compute-1.7.2.53-1.el7sat.noarch.rpm
foreman-debug-1.7.2.53-1.el7sat.noarch.rpm
foreman-gce-1.7.2.53-1.el7sat.noarch.rpm
foreman-libvirt-1.7.2.53-1.el7sat.noarch.rpm
foreman-ovirt-1.7.2.53-1.el7sat.noarch.rpm
foreman-postgresql-1.7.2.53-1.el7sat.noarch.rpm
foreman-vmware-1.7.2.53-1.el7sat.noarch.rpm
katello-installer-2.3.25-1.el7sat.noarch.rpm
katello-installer-base-2.3.25-1.el7sat.noarch.rpm
pulp-admin-client-2.6.0.20-1.el7sat.noarch.rpm
pulp-nodes-child-2.6.0.20-1.el7sat.noarch.rpm
pulp-nodes-common-2.6.0.20-1.el7sat.noarch.rpm
pulp-nodes-parent-2.6.0.20-1.el7sat.noarch.rpm
pulp-puppet-admin-extensions-2.6.0.20-1.el7sat.noarch.rpm
pulp-puppet-plugins-2.6.0.20-1.el7sat.noarch.rpm
pulp-puppet-tools-2.6.0.20-1.el7sat.noarch.rpm
pulp-rpm-admin-extensions-2.6.0.20-1.el7sat.noarch.rpm
pulp-rpm-handlers-2.6.0.20-1.el7sat.noarch.rpm
pulp-rpm-plugins-2.6.0.20-1.el7sat.noarch.rpm
pulp-selinux-2.6.0.20-1.el7sat.noarch.rpm
pulp-server-2.6.0.20-1.el7sat.noarch.rpm
python-kombu-3.0.24-11.pulp.el7sat.noarch.rpm
python-pulp-agent-lib-2.6.0.20-1.el7sat.noarch.rpm
python-pulp-bindings-2.6.0.20-1.el7sat.noarch.rpm
python-pulp-client-lib-2.6.0.20-1.el7sat.noarch.rpm
python-pulp-common-2.6.0.20-1.el7sat.noarch.rpm
python-pulp-puppet-common-2.6.0.20-1.el7sat.noarch.rpm
python-pulp-rpm-common-2.6.0.20-1.el7sat.noarch.rpm
ruby193-rubygem-fog-1.24.1-1.el7sat.noarch.rpm
ruby193-rubygem-katello-2.2.0.83-1.el7sat.noarch.rpm
rubygem-hammer_cli_katello-0.0.7.21-1.el7sat.noarch.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2015-7518
https://access.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2016 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iD8DBQFWwhamXlSAg2UNWIIRAuNFAJ43b3B+BWQh/2H9Y+r+yMFjQQECwQCfcZ8h
l/9C+SXeL0Ns0wYBTVrQM+Q=
=P5O9
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close