exploit the possibilities

Red Hat Security Advisory 2020-2740-01

Red Hat Security Advisory 2020-2740-01
Posted Jun 24, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-2740-01 - Red Hat Satellite is a system management solution that allows organizations to configure and maintain their systems without the necessity to provide public Internet access to their servers or other client systems. It performs provisioning and configuration management of predefined standard operating environments.

tags | advisory
systems | linux, redhat
advisories | CVE-2019-10086
MD5 | b6d9b6ad00afdffe810e851580fa866f

Red Hat Security Advisory 2020-2740-01

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================
Red Hat Security Advisory

Synopsis: Important: candlepin and satellite security update
Advisory ID: RHSA-2020:2740-01
Product: Red Hat Satellite 6
Advisory URL: https://access.redhat.com/errata/RHSA-2020:2740
Issue date: 2020-06-24
CVE Names: CVE-2019-10086
====================================================================
1. Summary:

An update for candlepin and satellite is now available for Red Hat
Satellite 6.5 for RHEL 7.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Satellite 6.5 - noarch
Red Hat Satellite Capsule 6.5 - noarch

3. Description:

Red Hat Satellite is a system management solution that allows organizations
to configure and maintain their systems without the necessity to provide
public Internet access to their servers or other client systems. It
performs provisioning and configuration management of predefined standard
operating environments.

Security Fix(es):

* apache-commons-beanutils: does not suppresses the class property in
PropertyUtilsBean by default (CVE-2019-10086)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For detailed instructions how to apply this update, refer to:

https://access.redhat.com/documentation/en-us/red_hat_satellite/6.6/html/up
grading_and_updating_red_hat_satellite/updating_satellite_server_capsule_se
rver_and_content_hosts

5. Bugs fixed (https://bugzilla.redhat.com/):

1767483 - CVE-2019-10086 apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default

6. Package List:

Red Hat Satellite Capsule 6.5:

Source:
satellite-6.5.3.2-1.el7sat.src.rpm

noarch:
satellite-capsule-6.5.3.2-1.el7sat.noarch.rpm
satellite-common-6.5.3.2-1.el7sat.noarch.rpm
satellite-debug-tools-6.5.3.2-1.el7sat.noarch.rpm

Red Hat Satellite 6.5:

Source:
candlepin-2.5.22-1.el7sat.src.rpm
satellite-6.5.3.2-1.el7sat.src.rpm

noarch:
candlepin-2.5.22-1.el7sat.noarch.rpm
candlepin-selinux-2.5.22-1.el7sat.noarch.rpm
satellite-6.5.3.2-1.el7sat.noarch.rpm
satellite-capsule-6.5.3.2-1.el7sat.noarch.rpm
satellite-cli-6.5.3.2-1.el7sat.noarch.rpm
satellite-common-6.5.3.2-1.el7sat.noarch.rpm
satellite-debug-tools-6.5.3.2-1.el7sat.noarch.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2019-10086
https://access.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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pC9g
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
Login or Register to add favorites

File Archive:

October 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    25 Files
  • 2
    Oct 2nd
    13 Files
  • 3
    Oct 3rd
    1 Files
  • 4
    Oct 4th
    1 Files
  • 5
    Oct 5th
    15 Files
  • 6
    Oct 6th
    15 Files
  • 7
    Oct 7th
    15 Files
  • 8
    Oct 8th
    11 Files
  • 9
    Oct 9th
    3 Files
  • 10
    Oct 10th
    1 Files
  • 11
    Oct 11th
    1 Files
  • 12
    Oct 12th
    8 Files
  • 13
    Oct 13th
    12 Files
  • 14
    Oct 14th
    23 Files
  • 15
    Oct 15th
    4 Files
  • 16
    Oct 16th
    13 Files
  • 17
    Oct 17th
    1 Files
  • 18
    Oct 18th
    1 Files
  • 19
    Oct 19th
    27 Files
  • 20
    Oct 20th
    41 Files
  • 21
    Oct 21st
    18 Files
  • 22
    Oct 22nd
    16 Files
  • 23
    Oct 23rd
    2 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close