Advisory Published
Advisory Published

RHSA-2022:7242: Important: Satellite 6.11.4 Async Security Update

First published: Thu Oct 27 2022(Updated: )

Red Hat Satellite is a system management solution that allows organizations to configure and maintain their systems without the necessity to provide public Internet access to their servers or other client systems. It performs provisioning and configuration management of predefined standard operating environments.<br>This update fixes the following bugs:<br>2131757 - Enhance foreman-rake katello:correct_repositories to handle Katello::Errors::CandlepinError: Unable to find content with the ID "xxxxxxxxxxx".<br>2131759 - RHEL 9 provisioned host goes into emergency mode after initial reboot<br>2131761 - hammer cannot use the cluster name or id as valid input when clusters are residing inside folders and fails with error Fog::Vsphere::Compute::NotFound error<br>2131763 - Running "satellite-maintain self-upgrade" on a Satellite\Capsule 6.11.1.1 fails with error "Error: 'satellite-maintenance-6.11.2-for-rhel-8-x86_64-rpms' does not match a valid repository ID"<br>2131769 - Post upgrade to 6.11.z, DHCP error with wrong number of arguments for validate_supported_address<br>2131771 - With every edit of an exising webhook, the value in password field disappears in Satellite 6.10/6.11/6.12<br>2131773 - foreman-maintain still enables ansible-2.9-for-rhel-8-x86_64-rpms repository for running an update to 6.11.z when no packages are installed from that repository<br>2131776 - please update to Satellite Ansible Collection 3.6.0<br>2131781 - 'candlepin-validate-db' pre-upgrade check fails with "Could not open SSL root certificate file /root/.postgresql/root.crt" error for external DB setup with SSL<br>2131788 - Documentation bug for the compute_resource module<br>2131790 - [BUG] Invalid choice for template_kind listed for os_default_template module<br>2132075 - CVE-2022-31163 tfm-rubygem-tzinfo: rubygem-tzinfo: arbitrary code execution [rhn_satellite_6.11]<br>2132076 - CVE-2022-31163 rubygem-tzinfo: rubygem-tzinfo: arbitrary code execution [rhn_satellite_6.11]<br>2132079 - CVE-2022-30122 rubygem-rack: crafted multipart POST request may cause a DoS [rhn_satellite_6-default] <br>2122205 - Package "python3-pulp_manifest" is not available in Satellite Utils repository <br>2132999 - Satellite cannot be installed on RHEL 8.7 <br>CVEs<br>CVE-2022-30122<br>CVE-2022-31163<br>Users of Red Hat Satellite are advised to upgrade to these updated packages, which fix these bugs.

Affected SoftwareAffected VersionHow to fix
redhat/foreman<3.1.1.25-1.el7
3.1.1.25-1.el7
redhat/satellite<6.11.4-2.el7
6.11.4-2.el7
redhat/foreman-cli<3.1.1.25-1.el7
3.1.1.25-1.el7
redhat/satellite-cli<6.11.4-2.el7
6.11.4-2.el7
redhat/ansible-collection-redhat-satellite<3.6.0-3.el8
3.6.0-3.el8
redhat/foreman<3.1.1.25-1.el8
3.1.1.25-1.el8
redhat/foreman-proxy<3.1.1.3-1.el8
3.1.1.3-1.el8
redhat/rubygem-katello<4.3.0.50-1.el8
4.3.0.50-1.el8
redhat/rubygem-rack<2.2.3.1-1.el8
2.2.3.1-1.el8
redhat/rubygem-tzinfo<1.2.10-1.el8
1.2.10-1.el8
redhat/satellite<6.11.4-2.el8
6.11.4-2.el8
redhat/foreman-cli<3.1.1.25-1.el8
3.1.1.25-1.el8
redhat/foreman-debug<3.1.1.25-1.el8
3.1.1.25-1.el8
redhat/foreman-dynflow-sidekiq<3.1.1.25-1.el8
3.1.1.25-1.el8
redhat/foreman-ec2<3.1.1.25-1.el8
3.1.1.25-1.el8
redhat/foreman-gce<3.1.1.25-1.el8
3.1.1.25-1.el8
redhat/foreman-journald<3.1.1.25-1.el8
3.1.1.25-1.el8
redhat/foreman-libvirt<3.1.1.25-1.el8
3.1.1.25-1.el8
redhat/foreman-openstack<3.1.1.25-1.el8
3.1.1.25-1.el8
redhat/foreman-ovirt<3.1.1.25-1.el8
3.1.1.25-1.el8
redhat/foreman-postgresql<3.1.1.25-1.el8
3.1.1.25-1.el8
redhat/foreman-proxy-journald<3.1.1.3-1.el8
3.1.1.3-1.el8
redhat/foreman-service<3.1.1.25-1.el8
3.1.1.25-1.el8
redhat/foreman-telemetry<3.1.1.25-1.el8
3.1.1.25-1.el8
redhat/foreman-vmware<3.1.1.25-1.el8
3.1.1.25-1.el8
redhat/satellite-cli<6.11.4-2.el8
6.11.4-2.el8
redhat/satellite-common<6.11.4-2.el8
6.11.4-2.el8
redhat/ansible-collection-redhat-satellite<3.6.0-3.el7
3.6.0-3.el7
redhat/foreman-proxy<3.1.1.3-1.el7
3.1.1.3-1.el7
redhat/tfm-rubygem-katello<4.3.0.50-1.el7
4.3.0.50-1.el7
redhat/tfm-rubygem-rack<2.2.3.1-1.el7
2.2.3.1-1.el7
redhat/tfm-rubygem-tzinfo<1.2.10-1.el7
1.2.10-1.el7
redhat/foreman-debug<3.1.1.25-1.el7
3.1.1.25-1.el7
redhat/foreman-dynflow-sidekiq<3.1.1.25-1.el7
3.1.1.25-1.el7
redhat/foreman-ec2<3.1.1.25-1.el7
3.1.1.25-1.el7
redhat/foreman-gce<3.1.1.25-1.el7
3.1.1.25-1.el7
redhat/foreman-journald<3.1.1.25-1.el7
3.1.1.25-1.el7
redhat/foreman-libvirt<3.1.1.25-1.el7
3.1.1.25-1.el7
redhat/foreman-openstack<3.1.1.25-1.el7
3.1.1.25-1.el7
redhat/foreman-ovirt<3.1.1.25-1.el7
3.1.1.25-1.el7
redhat/foreman-postgresql<3.1.1.25-1.el7
3.1.1.25-1.el7
redhat/foreman-proxy-journald<3.1.1.3-1.el7
3.1.1.3-1.el7
redhat/foreman-service<3.1.1.25-1.el7
3.1.1.25-1.el7
redhat/foreman-telemetry<3.1.1.25-1.el7
3.1.1.25-1.el7
redhat/foreman-vmware<3.1.1.25-1.el7
3.1.1.25-1.el7
redhat/satellite-common<6.11.4-2.el7
6.11.4-2.el7
redhat/satellite-capsule<6.11.4-2.el8
6.11.4-2.el8
redhat/satellite-capsule<6.11.4-2.el7
6.11.4-2.el7

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203