Skip to navigation

Security Advisory Moderate: yum-rhn-plugin security update

Advisory: RHSA-2008:0815-7
Type: Security Advisory
Severity: Moderate
Issued on: 2008-08-14
Last updated on: 2008-08-14
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)
Red Hat Enterprise Linux EUS (v. 5.2.z server)
CVEs (cve.mitre.org): CVE-2008-3270

Details

Updated yum-rhn-plugin packages that fix a security issue are now available
for Red Hat Enterprise Linux 5.

This update has been rated as having moderate security impact by the Red
Hat Security Response Team.

The yum-rhn-plugin provides support for yum to securely access a Red Hat
Network (RHN) server for software updates.

It was discovered that yum-rhn-plugin did not verify the SSL certificate
for all communication with a Red Hat Network server. An attacker able to
redirect the network communication between a victim and an RHN server could
use this flaw to provide malicious repository metadata. This metadata could
be used to block the victim from receiving specific security updates.
(CVE-2008-3270)

This flaw did not allow an attacker to install malicious packages. Package
signatures were verified and only packages signed with a trusted Red Hat
GPG key were installed.

Red Hat would like to thank Justin Cappos and Justin Samuel for discussing
various package update mechanism flaws which led to our discovery of this
issue.

Users of yum-rhn-plugin are advised to upgrade to this updated packages,
which resolves this issue.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
yum-rhn-plugin-0.5.3-12.el5_2.9.src.rpm
File outdated by:  RHBA-2013:1327
    MD5: 4d2043e1c09169f2aad3f78a7ed0365a
 
IA-32:
yum-rhn-plugin-0.5.3-12.el5_2.9.noarch.rpm
File outdated by:  RHBA-2013:1327
    MD5: f6f8dd367715e9685fe710dc9bde14f7
 
IA-64:
yum-rhn-plugin-0.5.3-12.el5_2.9.noarch.rpm
File outdated by:  RHBA-2013:1327
    MD5: f6f8dd367715e9685fe710dc9bde14f7
 
PPC:
yum-rhn-plugin-0.5.3-12.el5_2.9.noarch.rpm
File outdated by:  RHBA-2013:1327
    MD5: f6f8dd367715e9685fe710dc9bde14f7
 
s390x:
yum-rhn-plugin-0.5.3-12.el5_2.9.noarch.rpm
File outdated by:  RHBA-2013:1327
    MD5: f6f8dd367715e9685fe710dc9bde14f7
 
x86_64:
yum-rhn-plugin-0.5.3-12.el5_2.9.noarch.rpm
File outdated by:  RHBA-2013:1327
    MD5: f6f8dd367715e9685fe710dc9bde14f7
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
yum-rhn-plugin-0.5.3-12.el5_2.9.src.rpm
File outdated by:  RHBA-2013:1327
    MD5: 4d2043e1c09169f2aad3f78a7ed0365a
 
IA-32:
yum-rhn-plugin-0.5.3-12.el5_2.9.noarch.rpm
File outdated by:  RHBA-2013:1327
    MD5: f6f8dd367715e9685fe710dc9bde14f7
 
x86_64:
yum-rhn-plugin-0.5.3-12.el5_2.9.noarch.rpm
File outdated by:  RHBA-2013:1327
    MD5: f6f8dd367715e9685fe710dc9bde14f7
 
Red Hat Enterprise Linux EUS (v. 5.2.z server)

SRPMS:
yum-rhn-plugin-0.5.3-12.el5_2.9.src.rpm
File outdated by:  RHBA-2013:1327
    MD5: 4d2043e1c09169f2aad3f78a7ed0365a
 
IA-32:
yum-rhn-plugin-0.5.3-12.el5_2.9.noarch.rpm     MD5: f6f8dd367715e9685fe710dc9bde14f7
 
IA-64:
yum-rhn-plugin-0.5.3-12.el5_2.9.noarch.rpm     MD5: f6f8dd367715e9685fe710dc9bde14f7
 
PPC:
yum-rhn-plugin-0.5.3-12.el5_2.9.noarch.rpm     MD5: f6f8dd367715e9685fe710dc9bde14f7
 
s390x:
yum-rhn-plugin-0.5.3-12.el5_2.9.noarch.rpm     MD5: f6f8dd367715e9685fe710dc9bde14f7
 
x86_64:
yum-rhn-plugin-0.5.3-12.el5_2.9.noarch.rpm     MD5: f6f8dd367715e9685fe710dc9bde14f7
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

457113 - CVE-2008-3270 yum-rhn-plugin: does not verify SSL certificate for all communication with RHN server


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/