RHEL 7 : subscription-manager (RHSA-2016:2592)

Low Nessus Plugin ID 94555


The remote Red Hat host is missing one or more security updates.


An update for subscription-manager, subscription-manager-migration-data, and python-rhsm is now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

The subscription-manager packages provide programs and libraries to allow users to manage subscriptions and yum repositories from the Red Hat entitlement platform.

The subscription-manager-migration-data package provides certificates for migrating a system from the legacy Red Hat Network Classic (RHN) to Red Hat Subscription Management (RHSM).

The python-rhsm packages provide a library for communicating with the representational state transfer (REST) interface of a Red Hat Unified Entitlement Platform. The Subscription Management tools use this interface to manage system entitlements, certificates, and access to content.

The following packages have been upgraded to a newer upstream version:
subscription-manager (1.17.15), python-rhsm (1.17.9), subscription-manager-migration-data (2.0.31). (BZ#1328553, BZ#1328555, BZ#1328559)

Security Fix(es) :

* It was found that subscription-manager set weak permissions on files in /var/lib/rhsm/, causing an information disclosure. A local, unprivileged user could use this flaw to access sensitive data that could potentially be used in a social engineering attack.

Red Hat would like to thank Robert Scheck for reporting this issue.

Additional Changes :

For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.3 Release Notes linked from the References section.


Update the affected packages.

See Also




Plugin Details

Severity: Low

ID: 94555

File Name: redhat-RHSA-2016-2592.nasl

Version: $Revision: 2.5 $

Type: local

Agent: unix

Published: 2016/11/04

Modified: 2018/01/25

Dependencies: 12634

Risk Information

Risk Factor: Low


Base Score: 2.1

Temporal Score: 1.7

Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:N

Temporal Vector: CVSS2#E:F/RL:OF/RC:ND


Base Score: 3.3

Temporal Score: 3.1

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:X

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:python-rhsm, p-cpe:/a:redhat:enterprise_linux:python-rhsm-certificates, p-cpe:/a:redhat:enterprise_linux:python-rhsm-debuginfo, p-cpe:/a:redhat:enterprise_linux:subscription-manager, p-cpe:/a:redhat:enterprise_linux:subscription-manager-debuginfo, p-cpe:/a:redhat:enterprise_linux:subscription-manager-gui, p-cpe:/a:redhat:enterprise_linux:subscription-manager-initial-setup-addon, p-cpe:/a:redhat:enterprise_linux:subscription-manager-migration, p-cpe:/a:redhat:enterprise_linux:subscription-manager-migration-data, p-cpe:/a:redhat:enterprise_linux:subscription-manager-plugin-container, p-cpe:/a:redhat:enterprise_linux:subscription-manager-plugin-ostree, cpe:/o:redhat:enterprise_linux:7

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2016/11/03

Reference Information

CVE: CVE-2016-4455

OSVDB: 141450

RHSA: 2016:2592