RHEL 6 : Satellite Server (RHSA-2017:2645)

This script is Copyright (C) 2017 Tenable Network Security, Inc.

Synopsis :

The remote Red Hat host is missing one or more security updates.

Description :

An update for satellite-schema, spacewalk-backend, spacewalk-java, and
spacewalk-schema is now available for Red Hat Satellite 5.8 and Red
Hat Satellite 5.8 ELS.

Red Hat Product Security has rated this update as having a security
impact of Moderate. A Common Vulnerability Scoring System (CVSS) base
score, which gives a detailed severity rating, is available for each
vulnerability from the CVE link(s) in the References section.

Spacewalk is an Open Source systems management solution that provides
system provisioning, configuration and patching capabilities.

Red Hat Satellite is a system management tool for Linux-based
infrastructures. It allows for provisioning, monitoring, and the
remote management of multiple Linux deployments with a single,
centralized tool.

Security Fix(es) :

* A cross-site scripting (XSS) flaw was found in how an organization
name is displayed in Satellite 5. A user able to change an
organization's name could exploit this flaw to perform XSS attacks
against other Satellite users. (CVE-2017-7538)

This issue was discovered by Ales Dujicek (Red Hat).

Bug Fix(es) :

* Prior to this update, transferring content between Satellites using
Inter-Satellite Synchronization or channel-dumps failed to transfer
the product-name related to channels. This interfered with the process
of moving a server between EUS channels. The 'satellite-export' tool
now correctly provides associated product-names, fixing this behavior.
(BZ# 1446271)

* Prior to this update, the API call 'schedule.failSystemAction()'
allowed overwriting a system's event history. This is undesirable from
an auditing standpoint. The API now no longer allows affecting
completed or failed events. (BZ#1455887)

* Prior to this update, organization administrators who were not
allowed to change their organization's attributes could do so by
modifying form elements. The associated form controller no longer
allows this behavior. (BZ#1458722)

* Prior to this update, the 'download' tool's retry limit would be
incorrect if there were more available mirrors than its retry count.
It could also produce a harmless but unhelpful traceback in some
situations. Both of these behaviors have been fixed. (BZ#1458765)

* Prior to this update, it was possible for parallel registrations
using reactivation keys, that were creating snapshot entries, to
occasionally deadlock. Both the reactivation-key registration and
snapshot-creation paths have been updated to prevent these deadlocks.

* Prior to this update, if there was some problem with a single
erratum in a given repository, the 'reposync' command would complain
and exit. The tool now logs such errors but continues to synchronize
any remaining errata. (BZ #1466229)

* The Satellite 5.8 release failed to include an update to a
registration-failure error message that had been released for
Satellite 5.7. This restores the missing update. (BZ#1467632)

* Prior to this update, the list of systems in the System Set Manager
failed to display the correct icons for a system's update status. This
has been corrected. (BZ#1475067)

* Prior to this update, a timing window in the 'cdn-sync' command,
when synchronizing multiple channels at once, could cause some of the
synchronization attempts to be refused with a 403 error. This update
fixes the timing window so that multiple syncs should now work
reliably. (BZ# 1476924)

* Prior to this update, attempting to view the systems in the System
Set Manager that are affected by a given erratum would result in an
internal server error. This has been fixed. (BZ#1477508)

* Prior to this update, using 'cdn-sync --no-packages' on a specific
channel would disassociate all packages from that channel. This
behavior has been fixed, so that '--no-packages' now just skips that
step as intended. (BZ# 1477667)

See also :


Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 4.0
CVSS Temporal Score : 3.8
Public Exploit Available : true

Family: Red Hat Local Security Checks

Nessus Plugin ID: 103045 ()

Bugtraq ID:

CVE ID: CVE-2017-7538

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now