[RHSA-2023:4466-01] Important: Satellite 6.13.3 Async Security Update

Security announcements for all Red Hat products and services. rhsa-announce at redhat.com
Thu Aug 3 14:22:17 UTC 2023


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: Satellite 6.13.3 Async Security Update
Advisory ID:       RHSA-2023:4466-01
Product:           Red Hat Satellite 6
Advisory URL:      https://access.redhat.com/errata/RHSA-2023:4466
Issue date:        2023-08-03
CVE Names:         CVE-2022-40899 CVE-2023-0118 
=====================================================================

1. Summary:

Updated Satellite 6.13 packages that fixes important security bugs and
several
regular bugs are now available for Red Hat Satellite.

2. Relevant releases/architectures:

Red Hat Satellite 6.13 for RHEL 8 - noarch

3. Description:

Red Hat Satellite is a system management solution that allows organizations
to configure and maintain their systems without the necessity to provide
public Internet access to their servers or other client systems. It
performs provisioning and configuration management of predefined standard
operating environments.

Security fix(es):

foreman: Arbitrary code execution through templates. (CVE-2023-0118)
python-future: remote attackers can cause denial of service via crafted
Set-Cookie header from malicious web server (CVE-2022-40899)

This update fixes the following bugs:

2159659 - CVE-2023-0118 foreman: Arbitrary code execution through templates
[rhn_satellite_6.13]
2211954 - nalfassi at redhat.com 	Unable to enable callback plugin
per-template
2218653 - Unable to enable any repository in network sync
2218659 - Can't rerun a failed content-import task if it was exported using
chunks
2218660 - "Host-Registered Content Hosts" Report gives error while
generating - undefined method `nvra' for nil:NilClass
2218661 - Yet another deadlock during Capsule sync, now when existing
content changed
2218954 - satellite6-bugs at redhat.com 	[Regression] VMware Image-based and
full host boot disk based Provisioning fails with error-: Could not find
virtual machine network interface matching <IP>
2218955 - CVE-2022-40899 python-future: remote attackers can cause denial
of service via crafted Set-Cookie header from malicious web server
[rhn_satellite_6-default]
2218979 - Custom repo sync failed " Cannot open
/var/lib/pulp/tmp/89726 at satellite.example.com/tmpzmdau7qg/tmpy_kkhu3a:
Cannot detect compression type"
2224023 - "undefined method `event' for nil:NilClass" in production.log
when trying to remediate insights issues from CRC.
2218656 - satellite-maintain packages check-update fails when there are no
packages to be updated.
2218657 - Should not be able to assign LE on the client profile which is
not synced on the capsule server

Users of Red Hat Satellite are advised to upgrade to these updated
packages, which fix these bugs.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

2159291 - CVE-2023-0118 Foreman: Arbitrary code execution through templates
2165866 - CVE-2022-40899 python-future: remote attackers can cause denial of service via crafted Set-Cookie header from malicious web server
2211954 - Unable to enable callback plugin per-template
2218653 - Unable to enable any repository in network sync
2218656 - satellite-maintain packages check-update fails when there are no packages to be updated.
2218657 - Should not be able to assign LE on the client profile which is not synced on the capsule server
2218659 - Can't rerun a failed content-import task if it was exported using chunks
2218660 - "Host-Registered Content Hosts" Report gives error while generating - undefined method `nvra' for nil:NilClass
2218661 - Yet another deadlock during Capsule sync, now when existing content changed
2218954 - [Regression] VMware Image-based and full host boot disk based Provisioning fails with error-: Could not find virtual machine network interface matching <IP>
2218979 - Custom repo sync failed " Cannot open /var/lib/pulp/tmp/89726 at satellite.example.com/tmpzmdau7qg/tmpy_kkhu3a: Cannot detect compression type"
2224023 - "undefined method `event' for nil:NilClass" in production.log when trying to remediate insights issues from CRC.

6. Package List:

Red Hat Satellite 6.13 for RHEL 8:

Source:
foreman-3.5.1.19-1.el8sat.src.rpm
python-future-0.18.3-1.el8pc.src.rpm
python-pulp-rpm-3.18.17-1.el8pc.src.rpm
python-pulpcore-3.21.9-1.el8pc.src.rpm
rubygem-fog-vsphere-3.6.2-1.el8sat.src.rpm
rubygem-foreman_ansible-10.4.3-1.el8sat.src.rpm
rubygem-foreman_maintain-1.2.11-1.el8sat.src.rpm
rubygem-hammer_cli_foreman_ansible-0.5.0-1.el8sat.src.rpm
rubygem-katello-4.7.0.31-1.el8sat.src.rpm
rubygem-safemode-1.3.8-1.el8sat.src.rpm
satellite-6.13.3-1.el8sat.src.rpm

noarch:
foreman-3.5.1.19-1.el8sat.noarch.rpm
foreman-cli-3.5.1.19-1.el8sat.noarch.rpm
foreman-debug-3.5.1.19-1.el8sat.noarch.rpm
foreman-dynflow-sidekiq-3.5.1.19-1.el8sat.noarch.rpm
foreman-ec2-3.5.1.19-1.el8sat.noarch.rpm
foreman-journald-3.5.1.19-1.el8sat.noarch.rpm
foreman-libvirt-3.5.1.19-1.el8sat.noarch.rpm
foreman-openstack-3.5.1.19-1.el8sat.noarch.rpm
foreman-ovirt-3.5.1.19-1.el8sat.noarch.rpm
foreman-postgresql-3.5.1.19-1.el8sat.noarch.rpm
foreman-service-3.5.1.19-1.el8sat.noarch.rpm
foreman-telemetry-3.5.1.19-1.el8sat.noarch.rpm
foreman-vmware-3.5.1.19-1.el8sat.noarch.rpm
python39-future-0.18.3-1.el8pc.noarch.rpm
python39-pulp-rpm-3.18.17-1.el8pc.noarch.rpm
python39-pulpcore-3.21.9-1.el8pc.noarch.rpm
rubygem-fog-vsphere-3.6.2-1.el8sat.noarch.rpm
rubygem-foreman_ansible-10.4.3-1.el8sat.noarch.rpm
rubygem-foreman_maintain-1.2.11-1.el8sat.noarch.rpm
rubygem-hammer_cli_foreman_ansible-0.5.0-1.el8sat.noarch.rpm
rubygem-katello-4.7.0.31-1.el8sat.noarch.rpm
rubygem-safemode-1.3.8-1.el8sat.noarch.rpm
satellite-6.13.3-1.el8sat.noarch.rpm
satellite-cli-6.13.3-1.el8sat.noarch.rpm
satellite-common-6.13.3-1.el8sat.noarch.rpm

Red Hat Satellite 6.13 for RHEL 8:

Source:
foreman-3.5.1.19-1.el8sat.src.rpm
python-future-0.18.3-1.el8pc.src.rpm
python-pulp-rpm-3.18.17-1.el8pc.src.rpm
python-pulpcore-3.21.9-1.el8pc.src.rpm
rubygem-foreman_maintain-1.2.11-1.el8sat.src.rpm
satellite-6.13.3-1.el8sat.src.rpm

noarch:
foreman-debug-3.5.1.19-1.el8sat.noarch.rpm
python39-future-0.18.3-1.el8pc.noarch.rpm
python39-pulp-rpm-3.18.17-1.el8pc.noarch.rpm
python39-pulpcore-3.21.9-1.el8pc.noarch.rpm
rubygem-foreman_maintain-1.2.11-1.el8sat.noarch.rpm
satellite-capsule-6.13.3-1.el8sat.noarch.rpm
satellite-common-6.13.3-1.el8sat.noarch.rpm

Red Hat Satellite 6.13 for RHEL 8:

Source:
rubygem-foreman_maintain-1.2.11-1.el8sat.src.rpm

noarch:
rubygem-foreman_maintain-1.2.11-1.el8sat.noarch.rpm

Red Hat Satellite 6.13 for RHEL 8:

Source:
foreman-3.5.1.19-1.el8sat.src.rpm
rubygem-hammer_cli_foreman_ansible-0.5.0-1.el8sat.src.rpm
satellite-6.13.3-1.el8sat.src.rpm

noarch:
foreman-cli-3.5.1.19-1.el8sat.noarch.rpm
rubygem-hammer_cli_foreman_ansible-0.5.0-1.el8sat.noarch.rpm
satellite-cli-6.13.3-1.el8sat.noarch.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2022-40899
https://access.redhat.com/security/cve/CVE-2023-0118
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/documentation/en-us/red_hat_satellite/6.13/html/upgrading_and_updating_red_hat_satellite/index

8. Contact:

The Red Hat security contact is <secalert at redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2023 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=p/7I
-----END PGP SIGNATURE-----


More information about the RHSA-announce mailing list