Home / mailings [RHSA-2023:4466-01] Important: Satellite 6.13.3 Async Security Update
Posted on 03 August 2023
RedHat===================================================================== Red Hat Security Advisory
Synopsis: Important: Satellite 6.13.3 Async Security Update
Advisory ID: RHSA-2023:4466-01
Product: Red Hat Satellite 6
Advisory URL: https://access.redhat.com/errata/RHSA-2023:4466
Issue date: 2023-08-03
CVE Names: CVE-2022-40899 CVE-2023-0118
=====================================================================
1. Summary:
Updated Satellite 6.13 packages that fixes important security bugs and
several
regular bugs are now available for Red Hat Satellite.
2. Relevant releases/architectures:
Red Hat Satellite 6.13 for RHEL 8 - noarch
3. Description:
Red Hat Satellite is a system management solution that allows organizations
to configure and maintain their systems without the necessity to provide
public Internet access to their servers or other client systems. It
performs provisioning and configuration management of predefined standard
operating environments.
Security fix(es):
foreman: Arbitrary code execution through templates. (CVE-2023-0118)
python-future: remote attackers can cause denial of service via crafted
Set-Cookie header from malicious web server (CVE-2022-40899)
This update fixes the following bugs:
2159659 - CVE-2023-0118 foreman: Arbitrary code execution through templates
[rhn_satellite_6.13]
2211954 - nalfassi@redhat.com Unable to enable callback plugin
per-template
2218653 - Unable to enable any repository in network sync
2218659 - Can't rerun a failed content-import task if it was exported using
chunks
2218660 - "Host-Registered Content Hosts" Report gives error while
generating - undefined method `nvra' for nil:NilClass
2218661 - Yet another deadlock during Capsule sync, now when existing
content changed
2218954 - satellite6-bugs@redhat.com [Regression] VMware Image-based and
full host boot disk based Provisioning fails with error-: Could not find
virtual machine network interface matching <IP>
2218955 - CVE-2022-40899 python-future: remote attackers can cause denial
of service via crafted Set-Cookie header from malicious web server
[rhn_satellite_6-default]
2218979 - Custom repo sync failed " Cannot open
/var/lib/pulp/tmp/89726@satellite.example.com/tmpzmdau7qg/tmpy_kkhu3a:
Cannot detect compression type"
2224023 - "undefined method `event' for nil:NilClass" in production.log
when trying to remediate insights issues from CRC.
2218656 - satellite-maintain packages check-update fails when there are no
packages to be updated.
2218657 - Should not be able to assign LE on the client profile which is
not synced on the capsule server
Users of Red Hat Satellite are advised to upgrade to these updated
packages, which fix these bugs.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
2159291 - CVE-2023-0118 Foreman: Arbitrary code execution through templates
2165866 - CVE-2022-40899 python-future: remote attackers can cause denial of service via crafted Set-Cookie header from malicious web server
2211954 - Unable to enable callback plugin per-template
2218653 - Unable to enable any repository in network sync
2218656 - satellite-maintain packages check-update fails when there are no packages to be updated.
2218657 - Should not be able to assign LE on the client profile which is not synced on the capsule server
2218659 - Can't rerun a failed content-import task if it was exported using chunks
2218660 - "Host-Registered Content Hosts" Report gives error while generating - undefined method `nvra' for nil:NilClass
2218661 - Yet another deadlock during Capsule sync, now when existing content changed
2218954 - [Regression] VMware Image-based and full host boot disk based Provisioning fails with error-: Could not find virtual machine network interface matching <IP>
2218979 - Custom repo sync failed " Cannot open /var/lib/pulp/tmp/89726@satellite.example.com/tmpzmdau7qg/tmpy_kkhu3a: Cannot detect compression type"
2224023 - "undefined method `event' for nil:NilClass" in production.log when trying to remediate insights issues from CRC.
6. Package List:
Red Hat Satellite 6.13 for RHEL 8:
Source:
foreman-3.5.1.19-1.el8sat.src.rpm
python-future-0.18.3-1.el8pc.src.rpm
python-pulp-rpm-3.18.17-1.el8pc.src.rpm
python-pulpcore-3.21.9-1.el8pc.src.rpm
rubygem-fog-vsphere-3.6.2-1.el8sat.src.rpm
rubygem-foreman_ansible-10.4.3-1.el8sat.src.rpm
rubygem-foreman_maintain-1.2.11-1.el8sat.src.rpm
rubygem-hammer_cli_foreman_ansible-0.5.0-1.el8sat.src.rpm
rubygem-katello-4.7.0.31-1.el8sat.src.rpm
rubygem-safemode-1.3.8-1.el8sat.src.rpm
satellite-6.13.3-1.el8sat.src.rpm
noarch:
foreman-3.5.1.19-1.el8sat.noarch.rpm
foreman-cli-3.5.1.19-1.el8sat.noarch.rpm
foreman-debug-3.5.1.19-1.el8sat.noarch.rpm
foreman-dynflow-sidekiq-3.5.1.19-1.el8sat.noarch.rpm
foreman-ec2-3.5.1.19-1.el8sat.noarch.rpm
foreman-journald-3.5.1.19-1.el8sat.noarch.rpm
foreman-libvirt-3.5.1.19-1.el8sat.noarch.rpm
foreman-openstack-3.5.1.19-1.el8sat.noarch.rpm
foreman-ovirt-3.5.1.19-1.el8sat.noarch.rpm
foreman-postgresql-3.5.1.19-1.el8sat.noarch.rpm
foreman-service-3.5.1.19-1.el8sat.noarch.rpm
foreman-telemetry-3.5.1.19-1.el8sat.noarch.rpm
foreman-vmware-3.5.1.19-1.el8sat.noarch.rpm
python39-future-0.18.3-1.el8pc.noarch.rpm
python39-pulp-rpm-3.18.17-1.el8pc.noarch.rpm
python39-pulpcore-3.21.9-1.el8pc.noarch.rpm
rubygem-fog-vsphere-3.6.2-1.el8sat.noarch.rpm
rubygem-foreman_ansible-10.4.3-1.el8sat.noarch.rpm
rubygem-foreman_maintain-1.2.11-1.el8sat.noarch.rpm
rubygem-hammer_cli_foreman_ansible-0.5.0-1.el8sat.noarch.rpm
rubygem-katello-4.7.0.31-1.el8sat.noarch.rpm
rubygem-safemode-1.3.8-1.el8sat.noarch.rpm
satellite-6.13.3-1.el8sat.noarch.rpm
satellite-cli-6.13.3-1.el8sat.noarch.rpm
satellite-common-6.13.3-1.el8sat.noarch.rpm
Red Hat Satellite 6.13 for RHEL 8:
Source:
foreman-3.5.1.19-1.el8sat.src.rpm
python-future-0.18.3-1.el8pc.src.rpm
python-pulp-rpm-3.18.17-1.el8pc.src.rpm
python-pulpcore-3.21.9-1.el8pc.src.rpm
rubygem-foreman_maintain-1.2.11-1.el8sat.src.rpm
satellite-6.13.3-1.el8sat.src.rpm
noarch:
foreman-debug-3.5.1.19-1.el8sat.noarch.rpm
python39-future-0.18.3-1.el8pc.noarch.rpm
python39-pulp-rpm-3.18.17-1.el8pc.noarch.rpm
python39-pulpcore-3.21.9-1.el8pc.noarch.rpm
rubygem-foreman_maintain-1.2.11-1.el8sat.noarch.rpm
satellite-capsule-6.13.3-1.el8sat.noarch.rpm
satellite-common-6.13.3-1.el8sat.noarch.rpm
Red Hat Satellite 6.13 for RHEL 8:
Source:
rubygem-foreman_maintain-1.2.11-1.el8sat.src.rpm
noarch:
rubygem-foreman_maintain-1.2.11-1.el8sat.noarch.rpm
Red Hat Satellite 6.13 for RHEL 8:
Source:
foreman-3.5.1.19-1.el8sat.src.rpm
rubygem-hammer_cli_foreman_ansible-0.5.0-1.el8sat.src.rpm
satellite-6.13.3-1.el8sat.src.rpm
noarch:
foreman-cli-3.5.1.19-1.el8sat.noarch.rpm
rubygem-hammer_cli_foreman_ansible-0.5.0-1.el8sat.noarch.rpm
satellite-cli-6.13.3-1.el8sat.noarch.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2022-40899
https://access.redhat.com/security/cve/CVE-2023-0118
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/documentation/en-us/red_hat_satellite/6.13/html/upgrading_and_updating_red_hat_satellite/index
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2023 Red Hat, Inc.