- Issued:
- 2022-01-19
- Updated:
- 2022-01-19
RHSA-2022:0190 - Security Advisory
Synopsis
Moderate: Satellite 6.10.2 Async Bug Fix Update
Type/Severity
Security Advisory: Moderate
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated Satellite 6.10 packages that fix several bugs are now available for Red Hat Satellite.
Description
Red Hat Satellite is a system management solution that allows organizations to configure and maintain their systems without the necessity to provide public Internet access to their servers or other client systems. It performs provisioning and configuration management of predefined standard operating environments.
Security Fix(es):
1927028 - candlepin: netty: Information disclosure via the local system temporary directory (CVE-2021-21290)
This update fixes the following bugs:
2016047 - Uploading a duplicate file fails with undefined local variable or method upload_href for #<Actions::Pulp3::Repository::CommitUpload:0x00000000134e3f00>
2027347 - Satellite 6.10 upgrade fails with PG::NotNullViolation: ERROR: column "subscription_id" contains null values
2027354 - Using Satellite with a proxy produces an SELinux alert
2027358 - Large CRL file operation causes OOM error in Candlepin
2027817 - [BUG] Upgrading Satellite 6.9 with custom certificates to Satellite 6.10 beta will cause the same problem to occur as BZ# 1961886
2030445 - Failed at scanning for repository: undefined method `resolve_substitutions' for nil:NilClass
2030448 - Capsule sync task failed to refresh repo that doesn't have feed url with "bad argument (expected URI object or URI string)" error
Users of Red Hat Satellite are advised to upgrade to these updated packages, which fix these bugs.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For detailed instructions how to apply this update, refer to:
Affected Products
- Red Hat Satellite 6.10 x86_64
- Red Hat Satellite Capsule 6.10 x86_64
Fixes
- BZ - 1927028 - CVE-2021-21290 netty: Information disclosure via the local system temporary directory
- BZ - 2016047 - uploading a duplicate file fails with undefined local variable or method upload_href for #<Actions::Pulp3::Repository::CommitUpload:0x00000000134e3f00>
- BZ - 2027347 - Satellite 6.10 upgrade fails with PG::NotNullViolation: ERROR: column "subscription_id" contains null values
- BZ - 2027354 - Using Satellite with a proxy produces an SELinux alert
- BZ - 2027358 - Large CRL file operation causes OOM error in Candlepin
- BZ - 2027817 - [BUG] Upgrading Satellite 6.9 with custom certificates to Satellite 6.10 beta will cause the same problem to occur as BZ# 1961886
- BZ - 2030445 - Failed at scanning for repository: undefined method `resolve_substitutions' for nil:NilClass
- BZ - 2030448 - Capsule sync task failed to refresh repo that doesn't have feed url with "bad argument (expected URI object or URI string)" error
CVEs
Red Hat Satellite 6.10
SRPM | |
---|---|
pulpcore-selinux-1.2.7-1.el7pc.src.rpm | SHA-256: 17ac33a66e8a355f43d3ca9c59af80943719dd2e90c8760ae5f89b1ca4284efb |
satellite-6.10.2-1.el7sat.src.rpm | SHA-256: 0c3796a8a46825f7edfc0ef0df3a322bbd9d655b82cb4ddbe7e5cd89f34f77e8 |
tfm-rubygem-katello-4.1.1.42-1.el7sat.src.rpm | SHA-256: 6d3fd14dc30cbf83187a5a250c0298bc823689ac7dd2f9812c3a513112b9430e |
x86_64 | |
pulpcore-selinux-1.2.7-1.el7pc.x86_64.rpm | SHA-256: 1880a08c0b5eccea376bc89aff0eede3e2533475262c22be6a03156a63f89936 |
satellite-6.10.2-1.el7sat.noarch.rpm | SHA-256: 6e2445a0548b38a841b276971deb618614542c4c2a1a77efcaeca95836049d31 |
satellite-cli-6.10.2-1.el7sat.noarch.rpm | SHA-256: 5e8ce6236d37eb4d44baea47f2e9881702663563426892a8849fb71444397a8c |
satellite-common-6.10.2-1.el7sat.noarch.rpm | SHA-256: b5980470289dcad42a1e1ac222ef930b48aed1e18f96c7e67d6bced2618e6d83 |
tfm-rubygem-katello-4.1.1.42-1.el7sat.noarch.rpm | SHA-256: 4276d09b8db426c165d4c2607d1602a065c9ae7519a9476a147868672c2c9421 |
Red Hat Satellite Capsule 6.10
SRPM | |
---|---|
pulpcore-selinux-1.2.7-1.el7pc.src.rpm | SHA-256: 17ac33a66e8a355f43d3ca9c59af80943719dd2e90c8760ae5f89b1ca4284efb |
satellite-6.10.2-1.el7sat.src.rpm | SHA-256: 0c3796a8a46825f7edfc0ef0df3a322bbd9d655b82cb4ddbe7e5cd89f34f77e8 |
x86_64 | |
pulpcore-selinux-1.2.7-1.el7pc.x86_64.rpm | SHA-256: 1880a08c0b5eccea376bc89aff0eede3e2533475262c22be6a03156a63f89936 |
satellite-capsule-6.10.2-1.el7sat.noarch.rpm | SHA-256: ce069d61931f835bf12a018884c2a40de330fee9cb24e1e8c77a9469a7ceb863 |
satellite-common-6.10.2-1.el7sat.noarch.rpm | SHA-256: b5980470289dcad42a1e1ac222ef930b48aed1e18f96c7e67d6bced2618e6d83 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.