Red Hat has released a security update for rhn-client-tools in Red Hat Enterprise Linux 5
Red Hat Security Advisory
Synopsis: Moderate: rhn-client-tools security update
Advisory ID: RHSA-2010:0449-01
Product: Red Hat Enterprise Linux
Advisory URL: rhn.redhat.com | Red Hat Support
Issue date: 2010-06-01
CVE Names: CVE-2010-1439
Updated rhn-client-tools packages that fix one security issue are now
available for Red Hat Enterprise Linux 5.
The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux (v. 5 server) - noarch
Red Hat Enterprise Linux Desktop (v. 5 client) - noarch
Red Hat Network Client Tools provide programs and libraries that allow your
system to receive software updates from the Red Hat Network (RHN).
It was discovered that rhn-client-tools set insecure permissions on the
loginAuth.pkl file, used to store session credentials for authenticating
connections to Red Hat Network servers. A local, unprivileged user could
use these credentials to download packages from the Red Hat Network. They
could also manipulate package or action lists associated with the system's
Users of rhn-client-tools are advised to upgrade to these updated packages,
which contain a backported patch to correct this issue.
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available atRed Hat Knowledgebase: How do I apply package updates from the Red Hat Network?
5. Bugs fixed (http://bugzilla.redhat.com/):
585386 - CVE-2010-1439 rhn-client-tools: authorized information disclosure
6. Package List:
Red Hat Enterprise Linux Desktop (v. 5 client):
Red Hat Enterprise Linux (v. 5 server):
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available fromredhat.com | GPG Keys
7. References:redhat.com | CVE-2010-1439redhat.com | Severity Ratings
The Red Hat security contact is . More contact
details at redhat.com | Contact Security Response Team
Copyright 2010 Red Hat, Inc.