Red Hat Security Advisory 2023-5931-01 - Updated Satellite 6.13 packages that fixes Important security bugs and several regular bugs are now available for Red Hat Satellite. Issues addressed include code execution and denial of service vulnerabilities.
92f4ba8a374ccf4b8c54f463befe80a48c5c8417db88d5c1ad07c56aeb1db74b
The following data is constructed from data provided by Red Hat's json file at:
https://access.redhat.com/security/data/csaf/v2/advisories/2023/rhsa-2023_5931.json
Red Hat officially shut down their mailing list notifications October 10, 2023. Due to this, Packet Storm has recreated the below data as a reference point to raise awareness. It must be noted that due to an inability to easily track revision updates without crawling Red Hat's archive, these advisories are single notifications and we strongly suggest that you visit the Red Hat provided links to ensure you have the latest information available if the subject matter listed pertains to your environment.
- Packet Storm Staff
====================================================================
Red Hat Security Advisory
Synopsis: Important: Satellite 6.13.5 Async Security Update
Advisory ID: RHSA-2023:5931-01
Product: Red Hat Satellite 6
Advisory URL: https://access.redhat.com/errata/RHSA-2023:5931
Issue date: 2023-10-19
Revision: 01
CVE Names: CVE-2022-1292
====================================================================
Summary:
Updated Satellite 6.13 packages that fixes Important security bugs and several regular bugs are now available for Red Hat Satellite.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description:
Red Hat Satellite is a system management solution that allows organizations to configure and maintain their systems without the necessity to provide public Internet access to their servers or other client systems. It performs provisioning and configuration management of predefined standard operating environments.
Security fix(es):
* Yggdrasil-worker-forwarder (gRPC): Rapid Reset Attack through HTTP/2 enabled web service which leads to DDoS attack (CVE-2023-44487 & CVE-2023-39325)
A Red Hat Security Bulletin which addresses further details about this flaw is available in the References section.
* Foreman: OS command injection via ct_command and fcct_command (CVE-2022-3874)
* Foreman: Arbitrary code execution through yaml global parameters (CVE-2023-0462)
* GitPython: Remote code execution and improper input validation vulnerability (CVE-2022-24439 & CVE-2023-40267)
* Ruby-git & tfm-rubygem-git: Code injection vulnerability (CVE-2022-47318 & CVE-2022-46648)
* Python-django: Multiple flaws (CVE-2023-31047 & CVE-2023-36053)
* Puppet-agent (openssl): Multiple flaws (CVE-2022-1292 CVE-2022-2068)
This update fixes the following bugs:
2238346 - Red Hat supported provisioning templates are not recognized by RH icon on the row for a given template
2238348 - when creating a backup on rhel7 and restoring on rhel8, the restore process will fail with permission issues
2238350 - Virtual machine goes in re-provisioning mode while registration host using Global registration template.
2238359 - Capsule redundantly synces *-Export-Library repos
2238361 - Can't update the redhat_repository_url without changing the cdn_configuration to custom_cdn
2238363 - katello-certs-check does not cause the installer to halt execution on failure
2238367 - Satellite Web UI >> Hosts >> All Hosts page loading slow even after power isn't selected from the new option \"Manage columns\".
2238369 - Content-export incremental with syncable format based does not include productid file into repodata directory
2238371 - SELinux is preventing pulpcore-worker from read access on the key labeled pulpcore_server_t
2239041 - Reclaim space for repository fails with Cannot delete some instances of model 'Artifact' because they are referenced through protected foreign keys: 'ContentArtifact.artifact'.\"
2238353 - The \"hammer export\" command using single thread encryption causes a performance bottleneck.
2240781 - Remediation from CRC via Satellite shows \"Failed\" status even after successful remediation of Insights recommendations.
2241914 - \"NoMethodError: undefined method `fact_values'\" while trying to perform inventory upload
Users of Red Hat Satellite are advised to upgrade to these updated packages, which fix these bugs.
Solution:
https://access.redhat.com/articles/11258
CVEs:
CVE-2022-1292
References:
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/documentation/en-us/red_hat_satellite/6.13/html/upgrading_and_updating_red_hat_satellite/index
https://access.redhat.com/security/vulnerabilities/RHSB-2023-003