Executive Summary
Summary | |
---|---|
Title | katello-installer-base security and enhancement update |
Informations | |||
---|---|---|---|
Name | RHSA-2019:0733 | First vendor Publication | 2019-04-09 |
Vendor | RedHat | Last vendor Modification | 2019-04-09 |
Severity (Vendor) | N/A | Revision | 01 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:A/AC:L/Au:S/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 5.2 | Attack Range | Adjacent network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 5.1 | Authentication | Requires single instance |
Calculate full CVSS 2.0 Vectors scores |
Detail
Problem Description: An update for katello-installer-base which configures qpid-dispatch-router is now available for Red Hat Satellite 6.3 for RHEL 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Satellite 6.3 - noarch Red Hat Satellite Capsule 6.3 - noarch 3. Description: The qpid-dispatch-router package provides remote host management functionality and is configured through the katello-installer-base package. Additional packages included contain enhancements to support the fix. Security Fix: * qpid-dispatch-router: QMF methods were exposed to goferd via qdrouterd (CVE-2019-3845) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. This issue was discovered by Pavel Moravec (Red Hat). 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For detailed instructions how to apply this update, refer to: https://access.redhat.com/documentation/en-us/red_hat_satellite/6.3/html/up grading_and_updating_red_hat_satellite/updating_satellite_server_capsule_se rver_and_content_hosts#updating_satellite_server_to_next_minor_version 5. Bugs fixed (https://bugzilla.redhat.com/): 1684275 - CVE-2019-3845 qpid-dispatch-router: QMF methods exposed to goferd via qdrouterd |
Original Source
Url : https://rhn.redhat.com/errata/RHSA-2019-0733.html |
CPE : Common Platform Enumeration
Alert History
Date | Informations |
---|---|
2020-03-19 13:18:07 |
|