-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Moderate: Satellite 6.10.2 Async Bug Fix Update Advisory ID: RHSA-2022:0190-01 Product: Red Hat Satellite 6 Advisory URL: https://access.redhat.com/errata/RHSA-2022:0190 Issue date: 2022-01-19 CVE Names: CVE-2021-21290 ==================================================================== 1. Summary: Updated Satellite 6.10 packages that fix several bugs are now available for Red Hat Satellite. 2. Relevant releases/architectures: Red Hat Satellite 6.10 - noarch, x86_64 Red Hat Satellite Capsule 6.10 - noarch, x86_64 3. Description: Red Hat Satellite is a system management solution that allows organizations to configure and maintain their systems without the necessity to provide public Internet access to their servers or other client systems. It performs provisioning and configuration management of predefined standard operating environments. Security Fix(es): 1927028 - candlepin: netty: Information disclosure via the local system temporary directory (CVE-2021-21290) This update fixes the following bugs: 2016047 - Uploading a duplicate file fails with undefined local variable or method upload_href for # 2027347 - Satellite 6.10 upgrade fails with PG::NotNullViolation: ERROR: column "subscription_id" contains null values 2027354 - Using Satellite with a proxy produces an SELinux alert 2027358 - Large CRL file operation causes OOM error in Candlepin 2027817 - [BUG] Upgrading Satellite 6.9 with custom certificates to Satellite 6.10 beta will cause the same problem to occur as BZ# 1961886 2030445 - Failed at scanning for repository: undefined method `resolve_substitutions' for nil:NilClass 2030448 - Capsule sync task failed to refresh repo that doesn't have feed url with "bad argument (expected URI object or URI string)" error Users of Red Hat Satellite are advised to upgrade to these updated packages, which fix these bugs. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For detailed instructions how to apply this update, refer to: https://access.redhat.com/documentation/en-us/red_hat_satellite/6.10/html/upgrading_and_updating_red_hat_satellite/updating_satellite_server_capsule_server_and_content_hosts 5. Bugs fixed (https://bugzilla.redhat.com/): 1927028 - CVE-2021-21290 netty: Information disclosure via the local system temporary directory 2016047 - uploading a duplicate file fails with undefined local variable or method upload_href for # 2027347 - Satellite 6.10 upgrade fails with PG::NotNullViolation: ERROR: column "subscription_id" contains null values 2027354 - Using Satellite with a proxy produces an SELinux alert 2027358 - Large CRL file operation causes OOM error in Candlepin 2027817 - [BUG] Upgrading Satellite 6.9 with custom certificates to Satellite 6.10 beta will cause the same problem to occur as BZ# 1961886 2030445 - Failed at scanning for repository: undefined method `resolve_substitutions' for nil:NilClass 2030448 - Capsule sync task failed to refresh repo that doesn't have feed url with "bad argument (expected URI object or URI string)" error 6. Package List: Red Hat Satellite Capsule 6.10: Source: pulpcore-selinux-1.2.7-1.el7pc.src.rpm satellite-6.10.2-1.el7sat.src.rpm noarch: satellite-capsule-6.10.2-1.el7sat.noarch.rpm satellite-common-6.10.2-1.el7sat.noarch.rpm x86_64: pulpcore-selinux-1.2.7-1.el7pc.x86_64.rpm Red Hat Satellite 6.10: Source: pulpcore-selinux-1.2.7-1.el7pc.src.rpm satellite-6.10.2-1.el7sat.src.rpm tfm-rubygem-katello-4.1.1.42-1.el7sat.src.rpm noarch: satellite-6.10.2-1.el7sat.noarch.rpm satellite-cli-6.10.2-1.el7sat.noarch.rpm satellite-common-6.10.2-1.el7sat.noarch.rpm tfm-rubygem-katello-4.1.1.42-1.el7sat.noarch.rpm x86_64: pulpcore-selinux-1.2.7-1.el7pc.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2021-21290 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2022 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYehH1tzjgjWX9erEAQjoNxAAoA3wE4gxjDkhuLZC4UwY1HM9rORKUGTd +WdLexYFpu80zhpvH67AI7r0+LxuDP2Vhgj0y6e28VYZzRTrHXBhK+5xzmrEBkzR /sjEPC16WAxrMQHwGMmkOm4qC+1ScgWrEUIuZAj4HXT3u5375znQi2JvHjjvGs8E 1vpUJesJS+L8EqIDUJET5z2Ww3G3FqNLWUWKwiFRXX8R454xTVoPtNZ43rRN/0Gw 6B/5xwugTv1IkDGcryu5b+haCny0pT8pva+tE/xPTim/vbYyAuByWVlcSNIg21MB txmlhvXBftKHd/DYZp6Puy9jXQ2eqIfF0W5oDtgy669AibOI2YQfwBA1k++lvcXJ 5lKzYXi7HYfQJD+Sxy5MZOFO9zZR7XlqVZAplrl5QtC2eIc2mMEbqPJ4ofYGwwo4 zSLxlkd1YUFQMcamfPueMDlJmmj2sAPH5sBLNMtijEAQifKFwoT2XU6Zqn1gTPv9 vy3q9IS4/7H2rQNRpdpLOinwCvzzYegqdzsqx7DSHVvmEmEiFMdVylKgA11hOoXY L9FIgNki352KlXcIRH/2bK3L7sTKUBIKKQfq0rvDGRzpq3F4K6ghNZgzyM2lu5ec H6O8QKoDYRDmYZRz8bacEHovSHNY/V0GML0q4EH6vSpjJpQfcSmZMN/wa0gjBCqa lqEHQztuPo4=w+yj -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce