- Issued:
- 2024-03-27
- Updated:
- 2024-03-27
RHSA-2024:1536 - Moderate: Satellite 6.14.3 Async Security Update
Synopsis
Moderate: Satellite 6.14.3 Async Security Update
Type/Severity
Security Advisory Moderate
Topic
An update is now available for Red Hat Satellite 6.14 for RHEL 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
Red Hat Satellite is a system management solution that allows organizations to configure and maintain their systems without the necessity to provide public Internet access to their servers or other client systems. It performs provisioning and configuration management of predefined standard operating environments. Security Fix(es):
- automation-hub: Ansible Automation Hub: insecure galaxy-importer tarfile extraction (CVE-2023-5189)
- python-aiohttp: aiohttp: follow_symlinks directory traversal vulnerability (CVE-2024-23334)
- python-aiohttp: http request smuggling (CVE-2024-23829)
- python-aiohttp: numerous issues in HTTP parser with header parsing (CVE-2023-47627)
- python-aiohttp: aiohttp: HTTP request modification (CVE-2023-49081)
- python-django: Denial-of-service possibility in django.utils.text.Truncator (CVE-2023-43665)
- python-jinja2: jinja2: HTML attribute injection when passing user input as keys to xmlattr filter (CVE-2024-22195)
Bug Fix(es): 2266107 - hammer host list does not print parameters even if they are present in the fields list like LCE and CVs. 2266110 - Incremental update of multiple CVs with same repo of different content generates wrong katello content 2266139 - Failed incremental CV import shows error: duplicate key value violates unique constraint "rpm_updatecollectionname_name_update_record_id_6ef33bed_uniq" 2266140 - wrong links to provisioning guide in CR help 2266142 - When using the customer data (json) with 13 diff conf files, we can see some weird behavior when updating the hypervisors 2266144 - Promoting a composite content view to environment with registry name as "<%= lifecycle_environment.label %>/<%= repository.name %>" on Red Hat Satellite 6 fails with "'undefined method '#label' for NilClass::Jail (NilClass)'" 2266145 - CertificateCleanupJob fails with foreign key constraint violation on table cp_certificate 2266146 - katello:reimport fails with "TypeError: no implicit conversion of String into Integer" when there are product contents to move 2266147 - Postgresql logs contain PG::UniqueViolation: ERROR: duplicate key value violates unique constraint "katello_available_module_streams_name_stream_context" 2266148 - Adding a CV to a CCV lists CV versions disorderly 2266149 - 'Remove orphans' task fails on DeleteOrphanAlternateContentSources step 2266413 - [RFE] "Add content view" window and "Update version" window should display content view version, description and publishing date 2266113 - [RFE] To make customers aware about satellite versions going EOL by adding warning banner on the Login page or on the Dashboard page. 2266141 - wrong link to scap content documentation Users of Red Hat Satellite are advised to upgrade to these updated packages, which fix these bugs.
Solution
Before applying this update, make sure all previously released errata relevant to your system have been applied.
For detailed instructions how to apply this update, refer to:
Affected Products
| Product | Version | Arch |
|---|---|---|
| Red Hat Satellite | 6.14 | x86_64 |
| Red Hat Satellite Capsule | 6.14 | x86_64 |
| Red Hat Enterprise Linux for x86_64 | 8 | x86_64 |
Updated Packages
- python39-aiohttp-3.9.2-0.1.el8pc.x86_64.rpm
- rubygem-foreman_virt_who_configure-0.5.19-1.el8sat.src.rpm
- rubygem-hammer_cli_katello-1.9.1.3-1.el8sat.noarch.rpm
- python-django-3.2.22-1.el8pc.src.rpm
- rubygem-katello-4.9.0.23-1.el8sat.src.rpm
- rubygem-foreman_theme_satellite-12.0.0.8-1.el8sat.src.rpm
- python39-pycodestyle-2.9.1-0.1.el8pc.noarch.rpm
- rubygem-foreman_virt_who_configure-0.5.19-1.el8sat.noarch.rpm
- satellite-common-6.14.3-1.el8sat.noarch.rpm
- python39-jinja2-3.1.3-0.1.el8pc.noarch.rpm
- candlepin-4.3.12-1.el8sat.src.rpm
- rubygem-foreman_theme_satellite-12.0.0.8-1.el8sat.noarch.rpm
- python39-pulp-rpm-3.19.12-1.el8pc.noarch.rpm
- satellite-6.14.3-1.el8sat.src.rpm
- rubygem-hammer_cli_katello-1.9.1.3-1.el8sat.src.rpm
- python-jinja2-3.1.3-0.1.el8pc.src.rpm
- satellite-lifecycle-0.0.0.1-1.src.rpm
- python39-pyflakes-2.5.0-0.1.el8pc.noarch.rpm
- satellite-lifecycle-0.0.0.1-1.noarch.rpm
- python-async-timeout-4.0.3-0.1.el8pc.src.rpm
- python39-ansible-builder-1.2.0-1.el8pc.noarch.rpm
- python-ansible-builder-1.2.0-1.el8pc.src.rpm
- rubygem-katello-4.9.0.23-1.el8sat.noarch.rpm
- python39-mccabe-0.7.0-0.1.el8pc.noarch.rpm
- python-aiohttp-debugsource-3.9.2-0.1.el8pc.x86_64.rpm
- satellite-cli-6.14.3-1.el8sat.noarch.rpm
- satellite-capsule-6.14.3-1.el8sat.noarch.rpm
- python39-pulpcore-3.22.22-2.el8pc.noarch.rpm
- python-galaxy-importer-0.4.18-2.el8pc.src.rpm
- python-pycodestyle-2.9.1-0.1.el8pc.src.rpm
- python-pulpcore-3.22.22-2.el8pc.src.rpm
- python39-aiohttp-debuginfo-3.9.2-0.1.el8pc.x86_64.rpm
- python39-galaxy-importer-0.4.18-2.el8pc.noarch.rpm
- python-pyflakes-2.5.0-0.1.el8pc.src.rpm
- candlepin-selinux-4.3.12-1.el8sat.noarch.rpm
- python39-flake8-5.0.0-0.1.el8pc.noarch.rpm
- python-aiohttp-3.9.2-0.1.el8pc.src.rpm
- satellite-6.14.3-1.el8sat.noarch.rpm
- candlepin-4.3.12-1.el8sat.noarch.rpm
- python-flake8-5.0.0-0.1.el8pc.src.rpm
- python-mccabe-0.7.0-0.1.el8pc.src.rpm
- python39-django-3.2.22-1.el8pc.noarch.rpm
- python39-async-timeout-4.0.3-0.1.el8pc.noarch.rpm
- python-pulp-rpm-3.19.12-1.el8pc.src.rpm
Fixes
- This content is not included.BZ - 2234387
- This content is not included.BZ - 2241046
- This content is not included.BZ - 2249825
- This content is not included.BZ - 2252235
- This content is not included.BZ - 2257854
- This content is not included.BZ - 2261887
- This content is not included.BZ - 2261909
- This content is not included.BZ - 2266107
- This content is not included.BZ - 2266110
- This content is not included.BZ - 2266113
- This content is not included.BZ - 2266139
- This content is not included.BZ - 2266140
- This content is not included.BZ - 2266141
- This content is not included.BZ - 2266142
- This content is not included.BZ - 2266144
- This content is not included.BZ - 2266145
- This content is not included.BZ - 2266146
- This content is not included.BZ - 2266147
- This content is not included.BZ - 2266148
- This content is not included.BZ - 2266149
- This content is not included.BZ - 2266413
CVEs
- CVE-2023-5189
- CVE-2023-43665
- CVE-2023-47627
- CVE-2023-49081
- CVE-2024-22195
- CVE-2024-23334
- CVE-2024-23829
References
- https://access.redhat.com/security/updates/classification/#moderate
- This content is not included.This content is not included.https://access.redhat.com/documentation/en-us/red_hat_satellite/6.14/html/upgrading_and_updating_red_hat_satellite/index
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.