Skip to navigation

Security Advisory Moderate: rhn-client-tools security update

Advisory: RHSA-2010:0449-1
Type: Security Advisory
Severity: Moderate
Issued on: 2010-06-01
Last updated on: 2010-06-01
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)
CVEs (cve.mitre.org): CVE-2010-1439

Details

Updated rhn-client-tools packages that fix one security issue are now
available for Red Hat Enterprise Linux 5.

The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

Red Hat Network Client Tools provide programs and libraries that allow your
system to receive software updates from the Red Hat Network (RHN).

It was discovered that rhn-client-tools set insecure permissions on the
loginAuth.pkl file, used to store session credentials for authenticating
connections to Red Hat Network servers. A local, unprivileged user could
use these credentials to download packages from the Red Hat Network. They
could also manipulate package or action lists associated with the system's
profile. (CVE-2010-1439)

Users of rhn-client-tools are advised to upgrade to these updated packages,
which contain a backported patch to correct this issue.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
rhn-client-tools-0.4.20-33.el5_5.2.src.rpm
File outdated by:  RHBA-2013:1328
    MD5: d220cb6a8b2688dafb3a502813f8e254
SHA-256: 8feb2bd77b28c3ac4e4d917f39c239d0b3097f30bda70d4a2498ed7043ff4178
 
IA-32:
rhn-check-0.4.20-33.el5_5.2.noarch.rpm
File outdated by:  RHBA-2013:1328
    MD5: e9db51cac661c6ca3fa3f30cc03f9a1a
SHA-256: c6a9a12ee2c3c7e5f9afb66bb37f8be4c8eaf8159fe4ba9a6c6ad83c8659cf22
rhn-client-tools-0.4.20-33.el5_5.2.noarch.rpm
File outdated by:  RHBA-2013:1328
    MD5: c6420559f76a0e146761f845edea713c
SHA-256: 0cfdc9eb74f84529a697ac9a264f52060810d30712ed5291eabe011cb91998b6
rhn-setup-0.4.20-33.el5_5.2.noarch.rpm
File outdated by:  RHBA-2013:1328
    MD5: 9bdfab15e4523d8d1f1a30885f8fff53
SHA-256: 48636ccd922943cbd56bfbd8871e43dcf0185bebc84a264b41dc4b6beaf40b96
rhn-setup-gnome-0.4.20-33.el5_5.2.noarch.rpm
File outdated by:  RHBA-2013:1328
    MD5: d55c1f89e94b9cefe02efc4f2e9b8c50
SHA-256: 9d532f5687fbe936639d585c1136365cf3d643d647b47b5a05c93d4ae59d6da0
 
IA-64:
rhn-check-0.4.20-33.el5_5.2.noarch.rpm
File outdated by:  RHBA-2013:1328
    MD5: e9db51cac661c6ca3fa3f30cc03f9a1a
SHA-256: c6a9a12ee2c3c7e5f9afb66bb37f8be4c8eaf8159fe4ba9a6c6ad83c8659cf22
rhn-client-tools-0.4.20-33.el5_5.2.noarch.rpm
File outdated by:  RHBA-2013:1328
    MD5: c6420559f76a0e146761f845edea713c
SHA-256: 0cfdc9eb74f84529a697ac9a264f52060810d30712ed5291eabe011cb91998b6
rhn-setup-0.4.20-33.el5_5.2.noarch.rpm
File outdated by:  RHBA-2013:1328
    MD5: 9bdfab15e4523d8d1f1a30885f8fff53
SHA-256: 48636ccd922943cbd56bfbd8871e43dcf0185bebc84a264b41dc4b6beaf40b96
rhn-setup-gnome-0.4.20-33.el5_5.2.noarch.rpm
File outdated by:  RHBA-2013:1328
    MD5: d55c1f89e94b9cefe02efc4f2e9b8c50
SHA-256: 9d532f5687fbe936639d585c1136365cf3d643d647b47b5a05c93d4ae59d6da0
 
PPC:
rhn-check-0.4.20-33.el5_5.2.noarch.rpm
File outdated by:  RHBA-2013:1328
    MD5: e9db51cac661c6ca3fa3f30cc03f9a1a
SHA-256: c6a9a12ee2c3c7e5f9afb66bb37f8be4c8eaf8159fe4ba9a6c6ad83c8659cf22
rhn-client-tools-0.4.20-33.el5_5.2.noarch.rpm
File outdated by:  RHBA-2013:1328
    MD5: c6420559f76a0e146761f845edea713c
SHA-256: 0cfdc9eb74f84529a697ac9a264f52060810d30712ed5291eabe011cb91998b6
rhn-setup-0.4.20-33.el5_5.2.noarch.rpm
File outdated by:  RHBA-2013:1328
    MD5: 9bdfab15e4523d8d1f1a30885f8fff53
SHA-256: 48636ccd922943cbd56bfbd8871e43dcf0185bebc84a264b41dc4b6beaf40b96
rhn-setup-gnome-0.4.20-33.el5_5.2.noarch.rpm
File outdated by:  RHBA-2013:1328
    MD5: d55c1f89e94b9cefe02efc4f2e9b8c50
SHA-256: 9d532f5687fbe936639d585c1136365cf3d643d647b47b5a05c93d4ae59d6da0
 
s390x:
rhn-check-0.4.20-33.el5_5.2.noarch.rpm
File outdated by:  RHBA-2013:1328
    MD5: e9db51cac661c6ca3fa3f30cc03f9a1a
SHA-256: c6a9a12ee2c3c7e5f9afb66bb37f8be4c8eaf8159fe4ba9a6c6ad83c8659cf22
rhn-client-tools-0.4.20-33.el5_5.2.noarch.rpm
File outdated by:  RHBA-2013:1328
    MD5: c6420559f76a0e146761f845edea713c
SHA-256: 0cfdc9eb74f84529a697ac9a264f52060810d30712ed5291eabe011cb91998b6
rhn-setup-0.4.20-33.el5_5.2.noarch.rpm
File outdated by:  RHBA-2013:1328
    MD5: 9bdfab15e4523d8d1f1a30885f8fff53
SHA-256: 48636ccd922943cbd56bfbd8871e43dcf0185bebc84a264b41dc4b6beaf40b96
rhn-setup-gnome-0.4.20-33.el5_5.2.noarch.rpm
File outdated by:  RHBA-2013:1328
    MD5: d55c1f89e94b9cefe02efc4f2e9b8c50
SHA-256: 9d532f5687fbe936639d585c1136365cf3d643d647b47b5a05c93d4ae59d6da0
 
x86_64:
rhn-check-0.4.20-33.el5_5.2.noarch.rpm
File outdated by:  RHBA-2013:1328
    MD5: e9db51cac661c6ca3fa3f30cc03f9a1a
SHA-256: c6a9a12ee2c3c7e5f9afb66bb37f8be4c8eaf8159fe4ba9a6c6ad83c8659cf22
rhn-client-tools-0.4.20-33.el5_5.2.noarch.rpm
File outdated by:  RHBA-2013:1328
    MD5: c6420559f76a0e146761f845edea713c
SHA-256: 0cfdc9eb74f84529a697ac9a264f52060810d30712ed5291eabe011cb91998b6
rhn-setup-0.4.20-33.el5_5.2.noarch.rpm
File outdated by:  RHBA-2013:1328
    MD5: 9bdfab15e4523d8d1f1a30885f8fff53
SHA-256: 48636ccd922943cbd56bfbd8871e43dcf0185bebc84a264b41dc4b6beaf40b96
rhn-setup-gnome-0.4.20-33.el5_5.2.noarch.rpm
File outdated by:  RHBA-2013:1328
    MD5: d55c1f89e94b9cefe02efc4f2e9b8c50
SHA-256: 9d532f5687fbe936639d585c1136365cf3d643d647b47b5a05c93d4ae59d6da0
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
rhn-client-tools-0.4.20-33.el5_5.2.src.rpm
File outdated by:  RHBA-2013:1328
    MD5: d220cb6a8b2688dafb3a502813f8e254
SHA-256: 8feb2bd77b28c3ac4e4d917f39c239d0b3097f30bda70d4a2498ed7043ff4178
 
IA-32:
rhn-check-0.4.20-33.el5_5.2.noarch.rpm
File outdated by:  RHBA-2013:1328
    MD5: e9db51cac661c6ca3fa3f30cc03f9a1a
SHA-256: c6a9a12ee2c3c7e5f9afb66bb37f8be4c8eaf8159fe4ba9a6c6ad83c8659cf22
rhn-client-tools-0.4.20-33.el5_5.2.noarch.rpm
File outdated by:  RHBA-2013:1328
    MD5: c6420559f76a0e146761f845edea713c
SHA-256: 0cfdc9eb74f84529a697ac9a264f52060810d30712ed5291eabe011cb91998b6
rhn-setup-0.4.20-33.el5_5.2.noarch.rpm
File outdated by:  RHBA-2013:1328
    MD5: 9bdfab15e4523d8d1f1a30885f8fff53
SHA-256: 48636ccd922943cbd56bfbd8871e43dcf0185bebc84a264b41dc4b6beaf40b96
rhn-setup-gnome-0.4.20-33.el5_5.2.noarch.rpm
File outdated by:  RHBA-2013:1328
    MD5: d55c1f89e94b9cefe02efc4f2e9b8c50
SHA-256: 9d532f5687fbe936639d585c1136365cf3d643d647b47b5a05c93d4ae59d6da0
 
x86_64:
rhn-check-0.4.20-33.el5_5.2.noarch.rpm
File outdated by:  RHBA-2013:1328
    MD5: e9db51cac661c6ca3fa3f30cc03f9a1a
SHA-256: c6a9a12ee2c3c7e5f9afb66bb37f8be4c8eaf8159fe4ba9a6c6ad83c8659cf22
rhn-client-tools-0.4.20-33.el5_5.2.noarch.rpm
File outdated by:  RHBA-2013:1328
    MD5: c6420559f76a0e146761f845edea713c
SHA-256: 0cfdc9eb74f84529a697ac9a264f52060810d30712ed5291eabe011cb91998b6
rhn-setup-0.4.20-33.el5_5.2.noarch.rpm
File outdated by:  RHBA-2013:1328
    MD5: 9bdfab15e4523d8d1f1a30885f8fff53
SHA-256: 48636ccd922943cbd56bfbd8871e43dcf0185bebc84a264b41dc4b6beaf40b96
rhn-setup-gnome-0.4.20-33.el5_5.2.noarch.rpm
File outdated by:  RHBA-2013:1328
    MD5: d55c1f89e94b9cefe02efc4f2e9b8c50
SHA-256: 9d532f5687fbe936639d585c1136365cf3d643d647b47b5a05c93d4ae59d6da0
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

585386 - CVE-2010-1439 rhn-client-tools: authorized information disclosure


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/