Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2020.2198 candlepin and satellite security update 25 June 2020 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: candlepin and satellite Publisher: Red Hat Operating System: Red Hat Enterprise Linux Server 7 Red Hat Enterprise Linux WS/Desktop 7 Impact/Access: Reduced Security -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2019-10086 Reference: ESB-2020.2140 ESB-2020.0229 Original Bulletin: https://access.redhat.com/errata/RHSA-2020:2740 - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: candlepin and satellite security update Advisory ID: RHSA-2020:2740-01 Product: Red Hat Satellite 6 Advisory URL: https://access.redhat.com/errata/RHSA-2020:2740 Issue date: 2020-06-24 CVE Names: CVE-2019-10086 ===================================================================== 1. Summary: An update for candlepin and satellite is now available for Red Hat Satellite 6.5 for RHEL 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Satellite 6.5 - noarch Red Hat Satellite Capsule 6.5 - noarch 3. Description: Red Hat Satellite is a system management solution that allows organizations to configure and maintain their systems without the necessity to provide public Internet access to their servers or other client systems. It performs provisioning and configuration management of predefined standard operating environments. Security Fix(es): * apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default (CVE-2019-10086) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For detailed instructions how to apply this update, refer to: https://access.redhat.com/documentation/en-us/red_hat_satellite/6.6/html/up grading_and_updating_red_hat_satellite/updating_satellite_server_capsule_se rver_and_content_hosts 5. Bugs fixed (https://bugzilla.redhat.com/): 1767483 - CVE-2019-10086 apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default 6. Package List: Red Hat Satellite Capsule 6.5: Source: satellite-6.5.3.2-1.el7sat.src.rpm noarch: satellite-capsule-6.5.3.2-1.el7sat.noarch.rpm satellite-common-6.5.3.2-1.el7sat.noarch.rpm satellite-debug-tools-6.5.3.2-1.el7sat.noarch.rpm Red Hat Satellite 6.5: Source: candlepin-2.5.22-1.el7sat.src.rpm satellite-6.5.3.2-1.el7sat.src.rpm noarch: candlepin-2.5.22-1.el7sat.noarch.rpm candlepin-selinux-2.5.22-1.el7sat.noarch.rpm satellite-6.5.3.2-1.el7sat.noarch.rpm satellite-capsule-6.5.3.2-1.el7sat.noarch.rpm satellite-cli-6.5.3.2-1.el7sat.noarch.rpm satellite-common-6.5.3.2-1.el7sat.noarch.rpm satellite-debug-tools-6.5.3.2-1.el7sat.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2019-10086 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2020 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBXvNf9tzjgjWX9erEAQiM/Q//Zb39r+xCmnDeLn25bgTOSFo0RpYioVzm 5bnuJoKgQyE8kvCXcvt/sTYzO3LJqrNd8I0m3gKWzX+RNWkeJ5W6NsYw9xGycpoP 05beeqF1OCGekEkpEiIG2BBhyh6RHJ96/5QekO6SbncyZakB3LwoeP6ZBhgMQOXd KTaGZcMz1huhBSrnQF+lfXnSyLScSEvQfZigJ0fNJ9BgdCiZcYIe10QyCVgYvKiR KbiWFjVMyLJvlh/LC+Wt/GG3A8XD6jCnP7joEteEEvaNmG04ipKZ3+m+wOAIjRC0 GqSbg365/doj9XoqCtFgGUWqP80+wa3JKo8m4ZjWGO3OPCLUqpFbKNLq1iQSrGyW s4T46eLzlOlOoCIMTJ3m4b+o7ozQAJa3wZfe/vFEe0uwYmrXn8I/CsZvYV8TckWf xF4CcBfbUHQ6WQWpXZ7aTG9Q/7zapwaIJ+HatGdQK381tCQ85JggjqpdGksx9XW4 fWGpuRljRYZQ+HB+BLGaq4EkxLseCyNg6ek86BL3Cv9rxdFZLFV+A8/68iT6LhLE 75cXWk7ruDKvbsJxtKGC5OorQxMUZbugkQSS8fyRt8NcAKbYTLFfPkZxm3MzQ1/d YicuT+1oDmH4sP8KYTx8DU7QHXGOcAKfOKQGlA6zTyLtTUUDpEMOVBYmaY65PSKg 10EO7jr30lM= =pC9g - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXvPeUuNLKJtyKPYoAQjxeQ/9FPQe3S8Zg01mWIIurnjKPXphPVZZpCJ2 UVAFVyCUjKjAXgCXjYbiaIki4wbebrvPs4wNYVrAJeIPrTaTLx94vvHZ08GjLqyu IorRTl/InCXEI1QOHJQUdk9CdjKOUO52+9XXOBMBX2586g/UF10zzbrg8A+3BwIo q2A6KY8gxKeeATdvvAd7+tsrhQqpGeUoEZ0x+uMxgLzR3vn3Kvk5lqKqiyurDITf 2YDSzXsg9mbDAl4xTCgn67C71vh0uwNm78XhXGo5rjZrOtXoNTd4dwpjWAeBU8cl xw7nXPRwsUNVvIVm5K9IlfquEHUz/DDs0F3dJqR06J+Z830BvZqOafCB5VuBmzlj +Uke8F2zxhXYDMpAqin0dSMihHABGo61EpdBcb6tOoG5mkMnn7RVbJidg4J4BGFq WPEVgHWoIndz0Yp9VmXbQ9ItfqP7P5L0QH0HrWO31kmdxDsftE4ZE0Q7OsUUiNq+ +rYz3KtAts8RALq58ISFO6d32qSQEyt9CaYlWy9MKoektQwKTZH0NhzCy/oNqnXO cLwDmfIYQV/KZCr1NgU87XDc6sz3Byw/8aLKPmoacetuc4N8bbQc60TLYWazbgym iqRnYZZaCxv3xFNUHfiqYu4sCMMar4CfXbAMi1XtSsIu/MBExuAUXebDeplj1Z4v XLUvCUs9WfQ= =itGk -----END PGP SIGNATURE-----