Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2011:1299 - Security Advisory
Issued:
2011-09-15
Updated:
2011-09-15

RHSA-2011:1299 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: Red Hat Network Satellite server security and enhancement update

Type/Severity

Security Advisory: Moderate

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated packages that fix several security issues and add one enhancement
are now available for Red Hat Network Satellite 5.4.1 for Red Hat
Enterprise Linux 5 and 6.

The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

Description

Red Hat Network (RHN) Satellite provides a solution to organizations
requiring absolute control over and privacy of the maintenance and package
deployment of their servers. It allows organizations to utilize the
benefits of the Red Hat Network without having to provide public Internet
access to their servers or other client systems.

Multiple cross-site scripting (XSS) flaws were found in the RHN Satellite
web interface. A remote attacker could use these flaws to perform a
cross-site scripting attack against victims using the RHN Satellite web
interface. (CVE-2011-2919, CVE-2011-2920, CVE-2011-2927, CVE-2011-3344)

An open redirect flaw was found in the RHN Satellite web interface login
page. A remote attacker able to trick a victim to open the login page using
a specially-crafted link could redirect the victim to an arbitrary page
after they successfully log in. (CVE-2011-1594)

Red Hat would like to thank Daniel Karanja Muturi for reporting
CVE-2011-2919; Nils Juenemann and The Bearded Warriors for independently
reporting CVE-2011-2920; Nils Juenemann for reporting CVE-2011-2927;
Sylvain Maes for reporting CVE-2011-3344; and Thomas Biege of the SuSE
Security Team for reporting CVE-2011-1594.

This update also adds the following enhancement:

  • Session cookies set by RHN Satellite are now marked as HTTPOnly. This

setting helps reduce the impact of cross-site scripting flaws by
instructing the browser to disallow scripts access to those cookies.
(BZ#713477)

Users of Red Hat Network Satellite 5.4.1 are advised to upgrade to these
updated packages, which contain patches to correct these issues and add
this enhancement. For this update to take effect, Red Hat Network Satellite
must be restarted. Refer to the Solution section for details.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Run the following command to restart the Red Hat Network Satellite
server:

# rhn-satellite restart

Affected Products

  • Red Hat Satellite with Embedded Oracle 5.4 for RHEL 6 x86_64
  • Red Hat Satellite with Embedded Oracle 5.4 for RHEL 5 x86_64
  • Red Hat Satellite with Embedded Oracle 5.4 for RHEL 5 i386

Fixes

  • BZ - 672167 - CVE-2011-1594 RHN Satellite / Spacewalk: login page open redirect via url_bounce
  • BZ - 681032 - CVE-2011-2920 Satellite: XSS flaw(s) in filter handling
  • BZ - 713477 - [RFE] RHN Satellite / Spacewalk: Enable HTTPOnly cookies support in Satellite / Spacewalk (CWE-79)
  • BZ - 713478 - CVE-2011-2919 RHN Satellite / Spacewalk: XSS on SystemGroupList.do page
  • BZ - 730955 - CVE-2011-2927 Satellite/Spacewalk: XSS flaw in channels search
  • BZ - 731647 - CVE-2011-3344 Satellite/Spacewalk: XSS on the Lost Password page

CVEs

  • CVE-2011-3344
  • CVE-2011-1594
  • CVE-2011-2920
  • CVE-2011-2919
  • CVE-2011-2927

References

  • https://access.redhat.com/security/updates/classification/#moderate
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Satellite with Embedded Oracle 5.4 for RHEL 6

SRPM
spacewalk-config-1.2.2-7.el6sat.src.rpm SHA-256: 7c9321c7710db5ed6e35f24796c20afacbe3919153de3c935b7447193ac8531b
spacewalk-java-1.2.39-98.el6sat.src.rpm SHA-256: cd3d0d8de15bf280c5cd7fd4246a21111e8d8468345c6c656b8d566001c09044
spacewalk-web-1.2.7-20.el6sat.src.rpm SHA-256: 967526de78194ec2c107c868c0527077626229b7efe5c8f08e99b915784ec555
x86_64
spacewalk-base-1.2.7-20.el6sat.noarch.rpm SHA-256: 01694cde5596ccb0c19df8039d133b0b094864d941c9ce204f68b7bc19ffc75e
spacewalk-base-minimal-1.2.7-20.el6sat.noarch.rpm SHA-256: fb46d7321e883d67be2d780b06f3ffbb8449edb2265d6c8659a83d25ee842489
spacewalk-config-1.2.2-7.el6sat.noarch.rpm SHA-256: d4c0f702080f83bf30622979d368cd9f4b54e9ca510ac4649dee93dd63b915dd
spacewalk-dobby-1.2.7-20.el6sat.noarch.rpm SHA-256: ecb21d42977f7fb7332b18f96e7af2a766dbb5372e411281581366f0546a6711
spacewalk-grail-1.2.7-20.el6sat.noarch.rpm SHA-256: 98642d30529f6d2c8d682370591b43c6aa88449cceeecb04052acf741fb6dca2
spacewalk-html-1.2.7-20.el6sat.noarch.rpm SHA-256: 85cbfd1b9882a9701af3c911c18601598fb5b9fc5d1af02de6211019bedfd89d
spacewalk-java-1.2.39-98.el6sat.noarch.rpm SHA-256: 1741d34e30f132db61e7cebb8c83c955c4540876b37c1922387000bf0d772c97
spacewalk-java-config-1.2.39-98.el6sat.noarch.rpm SHA-256: 07fc5b8c06307db263b8e62af9c591d2a79b6d5d64776db3d84100b3e2334bbe
spacewalk-java-lib-1.2.39-98.el6sat.noarch.rpm SHA-256: 26905e8e9e5f55b64e9c1ccca14190b57a6f779e441fe403e5f577080e721ed7
spacewalk-java-oracle-1.2.39-98.el6sat.noarch.rpm SHA-256: 817b44a67315327baa6af8eddb3214652ea7e219efda71c1a07848de86ba5ccf
spacewalk-pxt-1.2.7-20.el6sat.noarch.rpm SHA-256: 1ed47d29e6b127ea1fd3fc60e14031ba7a2deaf174da1c510e2ab9c4896249fa
spacewalk-sniglets-1.2.7-20.el6sat.noarch.rpm SHA-256: 53860658be03b21b1f31d4b32bf50314ad40b8ba415ab224a940f4af0ae33736
spacewalk-taskomatic-1.2.39-98.el6sat.noarch.rpm SHA-256: fd081d1491440043ae2fbb740ab155abcf54adf8898fe11241e355ee6aab3e8d
s390x

Red Hat Satellite with Embedded Oracle 5.4 for RHEL 5

SRPM
spacewalk-config-1.2.2-7.el5sat.src.rpm SHA-256: 990b1d5bf79eaa1b3eb3cef8d33088f21c341270e6ea1f199adc071f1f82b131
spacewalk-java-1.2.39-98.el5sat.src.rpm SHA-256: d28fecd5ab27aef46327d927a58e1da1ea4e513bd38b0c71e603d8f47c733cc9
spacewalk-web-1.2.7-20.el5sat.src.rpm SHA-256: 1aa7ae191ccf19d3a538e0ca8be84441ecca9141bd105569080d3f7cbebd41d0
x86_64
spacewalk-base-1.2.7-20.el5sat.noarch.rpm SHA-256: 0e709dce0b250dc642b9667d1956f7b96c105052156557c5f4a8a886f9c60c93
spacewalk-base-minimal-1.2.7-20.el5sat.noarch.rpm SHA-256: edc30372c12dc20d4178465cce31e0d595da2a4311fccaef4aa2760fb35013d2
spacewalk-config-1.2.2-7.el5sat.noarch.rpm SHA-256: 077d7756f8f468c31f7def441efac804da12a84c2752784e540de9529ffd7795
spacewalk-dobby-1.2.7-20.el5sat.noarch.rpm SHA-256: 80d81c6d8697ca68784f07451d97f50ecaaa502b468bd8e56f4a864cdd9db307
spacewalk-grail-1.2.7-20.el5sat.noarch.rpm SHA-256: 6cc69cb3427164adc41baaef3554fa5e7ae2d272e94d1a5aaf2b2aca411b31e0
spacewalk-html-1.2.7-20.el5sat.noarch.rpm SHA-256: 57f87d90a71e270bcc57c3ad0fae08fbf7a213a30bdd1b8e55327c1bcf77c0cf
spacewalk-java-1.2.39-98.el5sat.noarch.rpm SHA-256: 93d4cbbb231792d284d0e354c71e91aa533881ddac88840f2be3e8ad9c91c028
spacewalk-java-config-1.2.39-98.el5sat.noarch.rpm SHA-256: 40317db73d68ee8d113099e77f722b7fc75f8d834e3cb8bfcb78aa3752756cc5
spacewalk-java-lib-1.2.39-98.el5sat.noarch.rpm SHA-256: 12af71731a0c48680ba44aea9273fc1bffb7315b83c20d30f734cc4ecd75b353
spacewalk-java-oracle-1.2.39-98.el5sat.noarch.rpm SHA-256: cace4017e0d80507d90efd6bb33eea826b740328995a0c8fbca538d92a67f478
spacewalk-pxt-1.2.7-20.el5sat.noarch.rpm SHA-256: 0a5fd82010ec7056614801756001aa4b718023af95af3baedcb1e2e78b444438
spacewalk-sniglets-1.2.7-20.el5sat.noarch.rpm SHA-256: fde885dc37fa25757ba9fcc7e0d3c6ea40ff3d60bd4619247f5d4f25bab8bd92
spacewalk-taskomatic-1.2.39-98.el5sat.noarch.rpm SHA-256: 1ac951191fca7ee1d812149a41e582795e2db20f80033ebe75a774ac8407e394
i386
spacewalk-base-1.2.7-20.el5sat.noarch.rpm SHA-256: 0e709dce0b250dc642b9667d1956f7b96c105052156557c5f4a8a886f9c60c93
spacewalk-base-minimal-1.2.7-20.el5sat.noarch.rpm SHA-256: edc30372c12dc20d4178465cce31e0d595da2a4311fccaef4aa2760fb35013d2
spacewalk-config-1.2.2-7.el5sat.noarch.rpm SHA-256: 077d7756f8f468c31f7def441efac804da12a84c2752784e540de9529ffd7795
spacewalk-dobby-1.2.7-20.el5sat.noarch.rpm SHA-256: 80d81c6d8697ca68784f07451d97f50ecaaa502b468bd8e56f4a864cdd9db307
spacewalk-grail-1.2.7-20.el5sat.noarch.rpm SHA-256: 6cc69cb3427164adc41baaef3554fa5e7ae2d272e94d1a5aaf2b2aca411b31e0
spacewalk-html-1.2.7-20.el5sat.noarch.rpm SHA-256: 57f87d90a71e270bcc57c3ad0fae08fbf7a213a30bdd1b8e55327c1bcf77c0cf
spacewalk-java-1.2.39-98.el5sat.noarch.rpm SHA-256: 93d4cbbb231792d284d0e354c71e91aa533881ddac88840f2be3e8ad9c91c028
spacewalk-java-config-1.2.39-98.el5sat.noarch.rpm SHA-256: 40317db73d68ee8d113099e77f722b7fc75f8d834e3cb8bfcb78aa3752756cc5
spacewalk-java-lib-1.2.39-98.el5sat.noarch.rpm SHA-256: 12af71731a0c48680ba44aea9273fc1bffb7315b83c20d30f734cc4ecd75b353
spacewalk-java-oracle-1.2.39-98.el5sat.noarch.rpm SHA-256: cace4017e0d80507d90efd6bb33eea826b740328995a0c8fbca538d92a67f478
spacewalk-pxt-1.2.7-20.el5sat.noarch.rpm SHA-256: 0a5fd82010ec7056614801756001aa4b718023af95af3baedcb1e2e78b444438
spacewalk-sniglets-1.2.7-20.el5sat.noarch.rpm SHA-256: fde885dc37fa25757ba9fcc7e0d3c6ea40ff3d60bd4619247f5d4f25bab8bd92
spacewalk-taskomatic-1.2.39-98.el5sat.noarch.rpm SHA-256: 1ac951191fca7ee1d812149a41e582795e2db20f80033ebe75a774ac8407e394

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility