- Issued:
- 2018-09-20
- Updated:
- 2018-09-20
RHSA-2018:2733 - Security Advisory
Synopsis
Critical: rubygem-smart_proxy_dynflow security update
Type/Severity
Security Advisory: Critical
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An update for rubygem-smart_proxy_dynflow is now available for Red Hat Satellite 6.3 for RHEL 7.
Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
The rubygem provided by rubygem-smart_proxy_dynflow is a plugin into Foreman's Smart Proxy for running Dynflow actions on the Smart Proxy.
Security Fix(es):
- smart_proxy_dynflow: Authentication bypass in Foreman remote execution feature (CVE-2018-14643)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
This issue was discovered by Ivan Necas (Red Hat).
Solution
This update does not require a full upgrade. Only the update of the rubygem-smart_proxy_dynflow package is required.
In order to update your Satellite system, follow the instructions below:
Stop all services:
# katello-service stop
Update rubygem-smart_proxy_dynflow
# yum update rubygem-smart_proxy_dynflow
Start services:
# katello-service restart
For detailed instructions how to apply this update, refer to:
Affected Products
- Red Hat Satellite 6.3 x86_64
- Red Hat Satellite Capsule 6.3 x86_64
Fixes
- BZ - 1629003 - CVE-2018-14643 rubygem-smart_proxy_dynflow: Authentication bypass in Foreman remote execution feature [rhn_satellite_6.3]
- BZ - 1629063 - CVE-2018-14643 smart_proxy_dynflow: Authentication bypass in Foreman remote execution feature
CVEs
Red Hat Satellite 6.3
SRPM | |
---|---|
rubygem-smart_proxy_dynflow-0.1.10.2-1.el7sat.src.rpm | SHA-256: 8dbcd2383a894f4c70c097d1cddc05767e68b084a352cf526dd9b4e9f3a48fe5 |
x86_64 | |
rubygem-smart_proxy_dynflow-0.1.10.2-1.el7sat.noarch.rpm | SHA-256: 14d67040ded7e9077e70d9d0a83d88c2a4c46c02957e6ff434618b94587d0a8b |
Red Hat Satellite Capsule 6.3
SRPM | |
---|---|
rubygem-smart_proxy_dynflow-0.1.10.2-1.el7sat.src.rpm | SHA-256: 8dbcd2383a894f4c70c097d1cddc05767e68b084a352cf526dd9b4e9f3a48fe5 |
x86_64 | |
rubygem-smart_proxy_dynflow-0.1.10.2-1.el7sat.noarch.rpm | SHA-256: 14d67040ded7e9077e70d9d0a83d88c2a4c46c02957e6ff434618b94587d0a8b |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.