Home / vulnerabilities Red Hat Security Advisory 2016-0174-01
Posted on 16 February 2016
Source : packetstormsecurity.org Link
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Moderate: Satellite 6.1.7 security, bug and enhancement fix update
Advisory ID: RHSA-2016:0174-01
Product: Red Hat Satellite 6
Advisory URL: https://access.redhat.com/errata/RHSA-2016:0174
Issue date: 2016-02-15
CVE Names: CVE-2015-7518
=====================================================================
1. Summary:
Updated Satellite 6.1 packages that fix one security issue, add one
enhancement, and fix several bugs are available for Satellite 6.1.7.
Red Hat Product Security has rated this update as having Moderate
Security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Satellite 6.1 - noarch
Red Hat Satellite Capsule 6.1 - noarch
3. Description:
Red Hat Satellite is a system management solution that allows
organizations to configure and maintain their systems without the
necessity to provide public Internet access to their servers or
other client systems. It performs provisioning and configuration
management of predefined standard operating environments.
A stored cross-site scripting (XSS) flaw was found in the smart
class parameters/variables field. By sending a specially crafted
request to Satellite, a remote, authenticated attacker could embed
HTML content into the stored data, allowing them to inject malicious
content into the web page that is used to view that data.
(CVE-2015-7518)
This update also fixes the following bugs:
* New subscription rules for developer subscriptions caused manifest
imports into Satellite to fail. The subscription engine has been
updated to handle these new subscription rules correctly.
(BZ#1301812)
* A heavy load on content synchronization caused tasks to appear as
if they had not stopped. The content engine has been updated to
handle these messages with varying amounts of load. (BZ#1300811)
* Deleted directories in the /var/lib/pulp/ directory caused errors
related to "missing symlinks" during content synchronization. The
code has been updated to notice deleted directories, and recreate
them as necessary. (BZ#1288855, BZ#1276911)
* The networking API returned a JSON output which did not contain
the identifier of the interface. This data is critical for
scripting, and has been added to the API response. (BZ#1282539)
* When provisioning against Red Hat Enterprise Virtualization
(RHEV), the operating system information was not passed, causing
provisioning to fail. The interface to RHEV has been updated to
resolve this bug. (BZ#1279631)
* Incremental updates initiated from the command line were failing
with an "ID not found" error. The command line interface has been
patched to provide the correct ID, thus fixing this bug.
(BZ#1259057)
* Satellite used a large number of inodes when publishing a content.
The internal file handling has been improved to reduce the number of
symlinks and inodes required. (BZ#1244130)
* Provisioning on VMWare with multiple NICs was not handling labels
correctly. The interface to VMWare has been improved to handle this
situation correctly. (BZ#1197156)
* Previously, failed synchronization tasks on a Capsule which were
not reported correctly, and appeared as successful in the web UI.
The error handing logic has been improved to display the true state
of the task. (BZ#1215838)
* Satellite synchronized duplicate packages with the same epoch,
name, version, release, and architecture (ENVRA), but which were
signed by different checksums. This caused issues for clients
attempting to install from the repository. The code was updated to
respect the primary metadata, and only download a single package.
(BZ#1132659)
Users of Red Hat Satellite are advised to upgrade to these updated
packages, which contain backported patches to correct these issues
and add this enhancement.
4. Solution:
Before applying this update, make sure all previously released
errata relevant to your system have been applied.
To update this system to include these fixes, ensure your system has
access to the latest Red Hat packages. For instructions on how to
apply this update, refer to:
https://access.redhat.com/articles/11258
Then re-run the installer to complete the upgrade:
# katello-installer --upgrade
or
# capsule-installer --upgrade
5. Bugs fixed (https://bugzilla.redhat.com/):
1132659 - better handle repositories with duplicate NVREAs
1215838 - Client Errata Install Tasks containing errors are still marked as a Success
1244130 - Pulp nodes (for capsules) disk usage uses O(N) inodes
1259057 - hammer incremental update is broken
1276911 - Capsule fails to publish kickstart tree due to missing target of symlink
1279631 - Network Based Provisioning of New Host in RHEV fails with "No bootable device."
1282539 - Interfaces API output is missing 'identifier'
1285728 - CVE-2015-7518 foreman: Stored XSS vulnerability in smart class parameters/variables
1288855 - Custom product content is not syncing to capsule
1300811 - Unacked messages in resource_manager queue
1301812 - Candlepin is failing on updating and importing manifest
6. Package List:
Red Hat Satellite Capsule 6.1:
Source:
foreman-1.7.2.53-1.el6_6sat.src.rpm
katello-installer-base-2.3.25-1.el6.src.rpm
pulp-2.6.0.20-1.el6.src.rpm
pulp-puppet-2.6.0.20-1.el6.src.rpm
pulp-rpm-2.6.0.20-1.el6.src.rpm
python-kombu-3.0.24-11.pulp.el6.src.rpm
noarch:
capsule-installer-2.3.25-1.el6.noarch.rpm
foreman-debug-1.7.2.53-1.el6_6sat.noarch.rpm
katello-installer-base-2.3.25-1.el6.noarch.rpm
pulp-admin-client-2.6.0.20-1.el6.noarch.rpm
pulp-nodes-child-2.6.0.20-1.el6.noarch.rpm
pulp-nodes-common-2.6.0.20-1.el6.noarch.rpm
pulp-nodes-parent-2.6.0.20-1.el6.noarch.rpm
pulp-puppet-admin-extensions-2.6.0.20-1.el6.noarch.rpm
pulp-puppet-plugins-2.6.0.20-1.el6.noarch.rpm
pulp-rpm-admin-extensions-2.6.0.20-1.el6.noarch.rpm
pulp-rpm-handlers-2.6.0.20-1.el6.noarch.rpm
pulp-rpm-plugins-2.6.0.20-1.el6.noarch.rpm
pulp-selinux-2.6.0.20-1.el6.noarch.rpm
pulp-server-2.6.0.20-1.el6.noarch.rpm
python-kombu-3.0.24-11.pulp.el6.noarch.rpm
python-pulp-agent-lib-2.6.0.20-1.el6.noarch.rpm
python-pulp-bindings-2.6.0.20-1.el6.noarch.rpm
python-pulp-client-lib-2.6.0.20-1.el6.noarch.rpm
python-pulp-common-2.6.0.20-1.el6.noarch.rpm
python-pulp-puppet-common-2.6.0.20-1.el6.noarch.rpm
python-pulp-rpm-common-2.6.0.20-1.el6.noarch.rpm
Red Hat Satellite 6.1:
Source:
candlepin-0.9.49.11-1.el6.src.rpm
foreman-1.7.2.53-1.el6_6sat.src.rpm
katello-installer-base-2.3.25-1.el6.src.rpm
pulp-2.6.0.20-1.el6.src.rpm
pulp-puppet-2.6.0.20-1.el6.src.rpm
pulp-rpm-2.6.0.20-1.el6.src.rpm
python-kombu-3.0.24-11.pulp.el6.src.rpm
ruby193-rubygem-fog-1.24.1-1.el6_6sat.src.rpm
ruby193-rubygem-katello-2.2.0.83-1.el6_6sat.src.rpm
rubygem-hammer_cli_katello-0.0.7.21-1.el6.src.rpm
noarch:
candlepin-0.9.49.11-1.el6.noarch.rpm
candlepin-selinux-0.9.49.11-1.el6.noarch.rpm
candlepin-tomcat6-0.9.49.11-1.el6.noarch.rpm
foreman-1.7.2.53-1.el6_6sat.noarch.rpm
foreman-compute-1.7.2.53-1.el6_6sat.noarch.rpm
foreman-debug-1.7.2.53-1.el6_6sat.noarch.rpm
foreman-gce-1.7.2.53-1.el6_6sat.noarch.rpm
foreman-libvirt-1.7.2.53-1.el6_6sat.noarch.rpm
foreman-ovirt-1.7.2.53-1.el6_6sat.noarch.rpm
foreman-postgresql-1.7.2.53-1.el6_6sat.noarch.rpm
foreman-vmware-1.7.2.53-1.el6_6sat.noarch.rpm
katello-installer-2.3.25-1.el6.noarch.rpm
katello-installer-base-2.3.25-1.el6.noarch.rpm
pulp-admin-client-2.6.0.20-1.el6.noarch.rpm
pulp-nodes-child-2.6.0.20-1.el6.noarch.rpm
pulp-nodes-common-2.6.0.20-1.el6.noarch.rpm
pulp-nodes-parent-2.6.0.20-1.el6.noarch.rpm
pulp-puppet-admin-extensions-2.6.0.20-1.el6.noarch.rpm
pulp-puppet-plugins-2.6.0.20-1.el6.noarch.rpm
pulp-puppet-tools-2.6.0.20-1.el6.noarch.rpm
pulp-rpm-admin-extensions-2.6.0.20-1.el6.noarch.rpm
pulp-rpm-handlers-2.6.0.20-1.el6.noarch.rpm
pulp-rpm-plugins-2.6.0.20-1.el6.noarch.rpm
pulp-selinux-2.6.0.20-1.el6.noarch.rpm
pulp-server-2.6.0.20-1.el6.noarch.rpm
python-kombu-3.0.24-11.pulp.el6.noarch.rpm
python-pulp-agent-lib-2.6.0.20-1.el6.noarch.rpm
python-pulp-bindings-2.6.0.20-1.el6.noarch.rpm
python-pulp-client-lib-2.6.0.20-1.el6.noarch.rpm
python-pulp-common-2.6.0.20-1.el6.noarch.rpm
python-pulp-puppet-common-2.6.0.20-1.el6.noarch.rpm
python-pulp-rpm-common-2.6.0.20-1.el6.noarch.rpm
ruby193-rubygem-fog-1.24.1-1.el6_6sat.noarch.rpm
ruby193-rubygem-katello-2.2.0.83-1.el6_6sat.noarch.rpm
rubygem-hammer_cli_katello-0.0.7.21-1.el6.noarch.rpm
Red Hat Satellite Capsule 6.1:
Source:
foreman-1.7.2.53-1.el7sat.src.rpm
katello-installer-base-2.3.25-1.el7sat.src.rpm
pulp-2.6.0.20-1.el7sat.src.rpm
pulp-puppet-2.6.0.20-1.el7sat.src.rpm
pulp-rpm-2.6.0.20-1.el7sat.src.rpm
python-kombu-3.0.24-11.pulp.el7sat.src.rpm
noarch:
capsule-installer-2.3.25-1.el7sat.noarch.rpm
foreman-debug-1.7.2.53-1.el7sat.noarch.rpm
katello-installer-base-2.3.25-1.el7sat.noarch.rpm
pulp-admin-client-2.6.0.20-1.el7sat.noarch.rpm
pulp-nodes-child-2.6.0.20-1.el7sat.noarch.rpm
pulp-nodes-common-2.6.0.20-1.el7sat.noarch.rpm
pulp-nodes-parent-2.6.0.20-1.el7sat.noarch.rpm
pulp-puppet-admin-extensions-2.6.0.20-1.el7sat.noarch.rpm
pulp-puppet-plugins-2.6.0.20-1.el7sat.noarch.rpm
pulp-rpm-admin-extensions-2.6.0.20-1.el7sat.noarch.rpm
pulp-rpm-handlers-2.6.0.20-1.el7sat.noarch.rpm
pulp-rpm-plugins-2.6.0.20-1.el7sat.noarch.rpm
pulp-selinux-2.6.0.20-1.el7sat.noarch.rpm
pulp-server-2.6.0.20-1.el7sat.noarch.rpm
python-kombu-3.0.24-11.pulp.el7sat.noarch.rpm
python-pulp-agent-lib-2.6.0.20-1.el7sat.noarch.rpm
python-pulp-bindings-2.6.0.20-1.el7sat.noarch.rpm
python-pulp-client-lib-2.6.0.20-1.el7sat.noarch.rpm
python-pulp-common-2.6.0.20-1.el7sat.noarch.rpm
python-pulp-puppet-common-2.6.0.20-1.el7sat.noarch.rpm
python-pulp-rpm-common-2.6.0.20-1.el7sat.noarch.rpm
Red Hat Satellite 6.1:
Source:
candlepin-0.9.49.11-1.el7.src.rpm
foreman-1.7.2.53-1.el7sat.src.rpm
katello-installer-base-2.3.25-1.el7sat.src.rpm
pulp-2.6.0.20-1.el7sat.src.rpm
pulp-puppet-2.6.0.20-1.el7sat.src.rpm
pulp-rpm-2.6.0.20-1.el7sat.src.rpm
python-kombu-3.0.24-11.pulp.el7sat.src.rpm
ruby193-rubygem-fog-1.24.1-1.el7sat.src.rpm
ruby193-rubygem-katello-2.2.0.83-1.el7sat.src.rpm
rubygem-hammer_cli_katello-0.0.7.21-1.el7sat.src.rpm
noarch:
candlepin-0.9.49.11-1.el7.noarch.rpm
candlepin-selinux-0.9.49.11-1.el7.noarch.rpm
candlepin-tomcat-0.9.49.11-1.el7.noarch.rpm
foreman-1.7.2.53-1.el7sat.noarch.rpm
foreman-compute-1.7.2.53-1.el7sat.noarch.rpm
foreman-debug-1.7.2.53-1.el7sat.noarch.rpm
foreman-gce-1.7.2.53-1.el7sat.noarch.rpm
foreman-libvirt-1.7.2.53-1.el7sat.noarch.rpm
foreman-ovirt-1.7.2.53-1.el7sat.noarch.rpm
foreman-postgresql-1.7.2.53-1.el7sat.noarch.rpm
foreman-vmware-1.7.2.53-1.el7sat.noarch.rpm
katello-installer-2.3.25-1.el7sat.noarch.rpm
katello-installer-base-2.3.25-1.el7sat.noarch.rpm
pulp-admin-client-2.6.0.20-1.el7sat.noarch.rpm
pulp-nodes-child-2.6.0.20-1.el7sat.noarch.rpm
pulp-nodes-common-2.6.0.20-1.el7sat.noarch.rpm
pulp-nodes-parent-2.6.0.20-1.el7sat.noarch.rpm
pulp-puppet-admin-extensions-2.6.0.20-1.el7sat.noarch.rpm
pulp-puppet-plugins-2.6.0.20-1.el7sat.noarch.rpm
pulp-puppet-tools-2.6.0.20-1.el7sat.noarch.rpm
pulp-rpm-admin-extensions-2.6.0.20-1.el7sat.noarch.rpm
pulp-rpm-handlers-2.6.0.20-1.el7sat.noarch.rpm
pulp-rpm-plugins-2.6.0.20-1.el7sat.noarch.rpm
pulp-selinux-2.6.0.20-1.el7sat.noarch.rpm
pulp-server-2.6.0.20-1.el7sat.noarch.rpm
python-kombu-3.0.24-11.pulp.el7sat.noarch.rpm
python-pulp-agent-lib-2.6.0.20-1.el7sat.noarch.rpm
python-pulp-bindings-2.6.0.20-1.el7sat.noarch.rpm
python-pulp-client-lib-2.6.0.20-1.el7sat.noarch.rpm
python-pulp-common-2.6.0.20-1.el7sat.noarch.rpm
python-pulp-puppet-common-2.6.0.20-1.el7sat.noarch.rpm
python-pulp-rpm-common-2.6.0.20-1.el7sat.noarch.rpm
ruby193-rubygem-fog-1.24.1-1.el7sat.noarch.rpm
ruby193-rubygem-katello-2.2.0.83-1.el7sat.noarch.rpm
rubygem-hammer_cli_katello-0.0.7.21-1.el7sat.noarch.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-7518
https://access.redhat.com/security/updates/classification/#moderate
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2016 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFWwhamXlSAg2UNWIIRAuNFAJ43b3B+BWQh/2H9Y+r+yMFjQQECwQCfcZ8h
l/9C+SXeL0Ns0wYBTVrQM+Q=
=P5O9
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce