-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: Satellite 6.13.3 Async Security Update Advisory ID: RHSA-2023:4466-01 Product: Red Hat Satellite 6 Advisory URL: https://access.redhat.com/errata/RHSA-2023:4466 Issue date: 2023-08-03 CVE Names: CVE-2022-40899 CVE-2023-0118 ===================================================================== 1. Summary: Updated Satellite 6.13 packages that fixes important security bugs and several regular bugs are now available for Red Hat Satellite. 2. Relevant releases/architectures: Red Hat Satellite 6.13 for RHEL 8 - noarch 3. Description: Red Hat Satellite is a system management solution that allows organizations to configure and maintain their systems without the necessity to provide public Internet access to their servers or other client systems. It performs provisioning and configuration management of predefined standard operating environments. Security fix(es): foreman: Arbitrary code execution through templates. (CVE-2023-0118) python-future: remote attackers can cause denial of service via crafted Set-Cookie header from malicious web server (CVE-2022-40899) This update fixes the following bugs: 2159659 - CVE-2023-0118 foreman: Arbitrary code execution through templates [rhn_satellite_6.13] 2211954 - nalfassi@redhat.com Unable to enable callback plugin per-template 2218653 - Unable to enable any repository in network sync 2218659 - Can't rerun a failed content-import task if it was exported using chunks 2218660 - "Host-Registered Content Hosts" Report gives error while generating - undefined method `nvra' for nil:NilClass 2218661 - Yet another deadlock during Capsule sync, now when existing content changed 2218954 - satellite6-bugs@redhat.com [Regression] VMware Image-based and full host boot disk based Provisioning fails with error-: Could not find virtual machine network interface matching 2218955 - CVE-2022-40899 python-future: remote attackers can cause denial of service via crafted Set-Cookie header from malicious web server [rhn_satellite_6-default] 2218979 - Custom repo sync failed " Cannot open /var/lib/pulp/tmp/89726@satellite.example.com/tmpzmdau7qg/tmpy_kkhu3a: Cannot detect compression type" 2224023 - "undefined method `event' for nil:NilClass" in production.log when trying to remediate insights issues from CRC. 2218656 - satellite-maintain packages check-update fails when there are no packages to be updated. 2218657 - Should not be able to assign LE on the client profile which is not synced on the capsule server Users of Red Hat Satellite are advised to upgrade to these updated packages, which fix these bugs. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 2159291 - CVE-2023-0118 Foreman: Arbitrary code execution through templates 2165866 - CVE-2022-40899 python-future: remote attackers can cause denial of service via crafted Set-Cookie header from malicious web server 2211954 - Unable to enable callback plugin per-template 2218653 - Unable to enable any repository in network sync 2218656 - satellite-maintain packages check-update fails when there are no packages to be updated. 2218657 - Should not be able to assign LE on the client profile which is not synced on the capsule server 2218659 - Can't rerun a failed content-import task if it was exported using chunks 2218660 - "Host-Registered Content Hosts" Report gives error while generating - undefined method `nvra' for nil:NilClass 2218661 - Yet another deadlock during Capsule sync, now when existing content changed 2218954 - [Regression] VMware Image-based and full host boot disk based Provisioning fails with error-: Could not find virtual machine network interface matching 2218979 - Custom repo sync failed " Cannot open /var/lib/pulp/tmp/89726@satellite.example.com/tmpzmdau7qg/tmpy_kkhu3a: Cannot detect compression type" 2224023 - "undefined method `event' for nil:NilClass" in production.log when trying to remediate insights issues from CRC. 6. Package List: Red Hat Satellite 6.13 for RHEL 8: Source: foreman-3.5.1.19-1.el8sat.src.rpm python-future-0.18.3-1.el8pc.src.rpm python-pulp-rpm-3.18.17-1.el8pc.src.rpm python-pulpcore-3.21.9-1.el8pc.src.rpm rubygem-fog-vsphere-3.6.2-1.el8sat.src.rpm rubygem-foreman_ansible-10.4.3-1.el8sat.src.rpm rubygem-foreman_maintain-1.2.11-1.el8sat.src.rpm rubygem-hammer_cli_foreman_ansible-0.5.0-1.el8sat.src.rpm rubygem-katello-4.7.0.31-1.el8sat.src.rpm rubygem-safemode-1.3.8-1.el8sat.src.rpm satellite-6.13.3-1.el8sat.src.rpm noarch: foreman-3.5.1.19-1.el8sat.noarch.rpm foreman-cli-3.5.1.19-1.el8sat.noarch.rpm foreman-debug-3.5.1.19-1.el8sat.noarch.rpm foreman-dynflow-sidekiq-3.5.1.19-1.el8sat.noarch.rpm foreman-ec2-3.5.1.19-1.el8sat.noarch.rpm foreman-journald-3.5.1.19-1.el8sat.noarch.rpm foreman-libvirt-3.5.1.19-1.el8sat.noarch.rpm foreman-openstack-3.5.1.19-1.el8sat.noarch.rpm foreman-ovirt-3.5.1.19-1.el8sat.noarch.rpm foreman-postgresql-3.5.1.19-1.el8sat.noarch.rpm foreman-service-3.5.1.19-1.el8sat.noarch.rpm foreman-telemetry-3.5.1.19-1.el8sat.noarch.rpm foreman-vmware-3.5.1.19-1.el8sat.noarch.rpm python39-future-0.18.3-1.el8pc.noarch.rpm python39-pulp-rpm-3.18.17-1.el8pc.noarch.rpm python39-pulpcore-3.21.9-1.el8pc.noarch.rpm rubygem-fog-vsphere-3.6.2-1.el8sat.noarch.rpm rubygem-foreman_ansible-10.4.3-1.el8sat.noarch.rpm rubygem-foreman_maintain-1.2.11-1.el8sat.noarch.rpm rubygem-hammer_cli_foreman_ansible-0.5.0-1.el8sat.noarch.rpm rubygem-katello-4.7.0.31-1.el8sat.noarch.rpm rubygem-safemode-1.3.8-1.el8sat.noarch.rpm satellite-6.13.3-1.el8sat.noarch.rpm satellite-cli-6.13.3-1.el8sat.noarch.rpm satellite-common-6.13.3-1.el8sat.noarch.rpm Red Hat Satellite 6.13 for RHEL 8: Source: foreman-3.5.1.19-1.el8sat.src.rpm python-future-0.18.3-1.el8pc.src.rpm python-pulp-rpm-3.18.17-1.el8pc.src.rpm python-pulpcore-3.21.9-1.el8pc.src.rpm rubygem-foreman_maintain-1.2.11-1.el8sat.src.rpm satellite-6.13.3-1.el8sat.src.rpm noarch: foreman-debug-3.5.1.19-1.el8sat.noarch.rpm python39-future-0.18.3-1.el8pc.noarch.rpm python39-pulp-rpm-3.18.17-1.el8pc.noarch.rpm python39-pulpcore-3.21.9-1.el8pc.noarch.rpm rubygem-foreman_maintain-1.2.11-1.el8sat.noarch.rpm satellite-capsule-6.13.3-1.el8sat.noarch.rpm satellite-common-6.13.3-1.el8sat.noarch.rpm Red Hat Satellite 6.13 for RHEL 8: Source: rubygem-foreman_maintain-1.2.11-1.el8sat.src.rpm noarch: rubygem-foreman_maintain-1.2.11-1.el8sat.noarch.rpm Red Hat Satellite 6.13 for RHEL 8: Source: foreman-3.5.1.19-1.el8sat.src.rpm rubygem-hammer_cli_foreman_ansible-0.5.0-1.el8sat.src.rpm satellite-6.13.3-1.el8sat.src.rpm noarch: foreman-cli-3.5.1.19-1.el8sat.noarch.rpm rubygem-hammer_cli_foreman_ansible-0.5.0-1.el8sat.noarch.rpm satellite-cli-6.13.3-1.el8sat.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2022-40899 https://access.redhat.com/security/cve/CVE-2023-0118 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/documentation/en-us/red_hat_satellite/6.13/html/upgrading_and_updating_red_hat_satellite/index 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2023 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCAAGBQJky7gXAAoJENzjgjWX9erEqH4P/iAmXbv2CeH2b5zoNlB59uXr lyF1hcNdiOvbIOeN1vZ+Gv5m3tp9oX3MQfgrGmJYHTwOhONH+ViNVif3/FCndNS6 u93Ae8QMa1EcM8liTAE4i44tNmy0rXFDDgvlPYkfnT4qjZ1SpFJl2XZTq/QFMRA7 pmG6mV9eiUN6n2YIpyfdiaRGwFooN6WwfuNKpsoeaEv9cTCRPuxT55xbwBb+hAGn AzXV+Vx4nLRE8VjWHkKZJY+U90P+t5mGQT6MHqlWI62cNOcT9DCJ5t5inKFQcdYE ak6zvYODgxIR2sFvgWK/+MyoG1kSNvDBRJpsl91tuBOJeW3cD1mpq4UBE6hzsa2i /7OOMWYeQoMIwPfMcoof7189ZkhdeXxTVfI2D1nI14c8zT1XUpWWU5Q8KSoYY91t YODj1Put6RrSFbgZ+DYkDI0EHpXrDvMwx2iEBm7yEj2BsE6KYXn1G4klGQG4zUWk UPKYqT9gQH4IftyyylY7eoCUhiKfR+TKuc0dPY3YZHuPdhkoOd06F/E/wAdszmKu KHiK1ZAD5yEGWaV6MzD74A7Pdc5jIXyacNeEEcvI7NM4o8BSY9mZ1tGYnCqdmzcx lpC/uHP6/yAEIcOpt/NFTHUTjL95nFzniR42qcbguy7+/WdZXkDYjRd0zUhHsqlh JnD0jILnk1mBhEZY/qjn =p/7I -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce