-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================                   Red Hat Security Advisory

Synopsis:          Low: keycloak-httpd-client-install security, bug fix, and enhancement update
Advisory ID:       RHSA-2019:2137-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://access.redhat.com/errata/RHSA-2019:2137
Issue date:        2019-08-06
CVE Names:         CVE-2017-15111 CVE-2017-15112 
====================================================================
1. Summary:

An update for keycloak-httpd-client-install is now available for Red Hat
Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact
of Low. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Server (v. 7) - noarch
Red Hat Enterprise Linux Workstation (v. 7) - noarch

3. Description:

The keycloak-httpd-client-install packages provide various libraries and
tools that can automate and simplify the configuration of Apache httpd
authentication modules when registering as a Red Hat Single Sign-On
(RH-SSO, also called Keycloak) federated Identity Provider (IdP) client. 

The following packages have been upgraded to a later upstream version:
keycloak-httpd-client-install (0.8). (BZ#1673716)

Security Fix(es):

* keycloak-httpd-client-install: unsafe /tmp log file in --log-file option
in keycloak_cli.py (CVE-2017-15111)

* keycloak-httpd-client-install: unsafe use of -p/--admin-password on
command line (CVE-2017-15112)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat
Enterprise Linux 7.7 Release Notes linked from the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

After installing the updated packages, the httpd daemon will be restarted
automatically.

5. Bugs fixed (https://bugzilla.redhat.com/):

1511623 - CVE-2017-15111 keycloak-httpd-client-install: unsafe /tmp log file in --log-file option in keycloak_cli.py
1511626 - CVE-2017-15112 keycloak-httpd-client-install: unsafe use of -p/--admin-password on command line
1673716 - Rebase k-h-c-i to version 0.8

6. Package List:

Red Hat Enterprise Linux Server (v. 7):

Source:
keycloak-httpd-client-install-0.8-1.el7.src.rpm

noarch:
keycloak-httpd-client-install-0.8-1.el7.noarch.rpm
python2-keycloak-httpd-client-install-0.8-1.el7.noarch.rpm

Red Hat Enterprise Linux Workstation (v. 7):

Source:
keycloak-httpd-client-install-0.8-1.el7.src.rpm

noarch:
keycloak-httpd-client-install-0.8-1.el7.noarch.rpm
python2-keycloak-httpd-client-install-0.8-1.el7.noarch.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2017-15111
https://access.redhat.com/security/cve/CVE-2017-15112
https://access.redhat.com/security/updates/classification/#low
https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.7_release_notes/index

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2019 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIVAwUBXUl2t9zjgjWX9erEAQgZSA/+J4nhmOlUCoXb4z1M3q0C/JpsyaTQJGIM
gHFjXPAHm2cn0itG9wNij2+r9blnIF2QWAOeJgcI8VfMANJrs9U1NetfzBeprxyy
+gJvXUCRd+kS4Obmq28E2DBeMONHxg3XsurxSKl1AlNmhHCN9aga+Pv7OSmYEteC
eSrhym1ij9p7WUBCx0GrlefSkrYNHBpgtb19l+16D6DiOjqXvypWllkcLXXyPmyl
94g1zZB6+lR31CyPUn1gbWOXmWm3jVKuIHcqBn7bHv8kQUtMaGGMKFCLTDsuC7r5
LR50ZHUlarxZ5QfwLVJZE4230mM3rXR7oOfEC6qnnEhZGkX1zvahLSeDrdmAMQj5
AI1UVwZSD/qWuHEM9lekvKQ7DB28urpewUk2DdD1QUkOiUhTps2xSFjbJte9uNm+
Wlzbjpi3+U1eM7PL2aiS3YQCUrk/4waRMkCODVi4FzR6L4VrP27aUaMJeAT1/nMz
vrAEZ5990M/NipaUcV7SFQs4B81kV8p1vAkcvao5PyzDt57hQyrMqA/FwuGyuWLn
U04VeBmzFoG7/RM6L5KM6i6TPVtFjQOAibYTgIlvdlHJJPtEU6xpn87LsRB7s4Wi
x6W6BPAybqgr4LtuwbBYQ1mCtNARQh6b9NdfLPVxT8FkMXPXnh5jdcvaGiLsuSBU
41ciNoaa5oM=9jwT
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2019-2137:01 Low: keycloak-httpd-client-install security,

An update for keycloak-httpd-client-install is now available for Red Hat Enterprise Linux 7

Summary

The keycloak-httpd-client-install packages provide various libraries and tools that can automate and simplify the configuration of Apache httpd authentication modules when registering as a Red Hat Single Sign-On (RH-SSO, also called Keycloak) federated Identity Provider (IdP) client.
The following packages have been upgraded to a later upstream version: keycloak-httpd-client-install (0.8). (BZ#1673716)
Security Fix(es):
* keycloak-httpd-client-install: unsafe /tmp log file in --log-file option in keycloak_cli.py (CVE-2017-15111)
* keycloak-httpd-client-install: unsafe use of -p/--admin-password on command line (CVE-2017-15112)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.7 Release Notes linked from the References section.



Summary


Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
After installing the updated packages, the httpd daemon will be restarted automatically.

References

https://access.redhat.com/security/cve/CVE-2017-15111 https://access.redhat.com/security/cve/CVE-2017-15112 https://access.redhat.com/security/updates/classification/#low https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.7_release_notes/index

Package List

Red Hat Enterprise Linux Server (v. 7):
Source: keycloak-httpd-client-install-0.8-1.el7.src.rpm
noarch: keycloak-httpd-client-install-0.8-1.el7.noarch.rpm python2-keycloak-httpd-client-install-0.8-1.el7.noarch.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source: keycloak-httpd-client-install-0.8-1.el7.src.rpm
noarch: keycloak-httpd-client-install-0.8-1.el7.noarch.rpm python2-keycloak-httpd-client-install-0.8-1.el7.noarch.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/


Severity
Advisory ID: RHSA-2019:2137-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2019:2137
Issued Date: : 2019-08-06
CVE Names: CVE-2017-15111 CVE-2017-15112

Topic

An update for keycloak-httpd-client-install is now available for Red HatEnterprise Linux 7.Red Hat Product Security has rated this update as having a security impactof Low. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available for each vulnerability fromthe CVE link(s) in the References section.


Topic


 

Relevant Releases Architectures

Red Hat Enterprise Linux Server (v. 7) - noarch

Red Hat Enterprise Linux Workstation (v. 7) - noarch


Bugs Fixed

1511623 - CVE-2017-15111 keycloak-httpd-client-install: unsafe /tmp log file in --log-file option in keycloak_cli.py

1511626 - CVE-2017-15112 keycloak-httpd-client-install: unsafe use of -p/--admin-password on command line

1673716 - Rebase k-h-c-i to version 0.8


Related News