8.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
5.1 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
HIGH
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:H/Au:N/C:P/I:P/A:P
0.003 Low
EPSS
Percentile
68.1%
Red Hat Satellite is a system management solution that allows organizations to configure and maintain their systems without the necessity to provide public Internet access to their servers or other client systems. It performs provisioning and configuration management of predefined standard operating environments.
This update fixes the following bugs:
2131757 - Enhance foreman-rake katello:correct_repositories to handle Katello::Errors::CandlepinError: Unable to find content with the ID “xxxxxxxxxxx”.
2131759 - RHEL 9 provisioned host goes into emergency mode after initial reboot
2131761 - hammer cannot use the cluster name or id as valid input when clusters are residing inside folders and fails with error Fog::Vsphere::Compute::NotFound error
2131763 - Running “satellite-maintain self-upgrade” on a Satellite\Capsule 6.11.1.1 fails with error “Error: ‘satellite-maintenance-6.11.2-for-rhel-8-x86_64-rpms’ does not match a valid repository ID”
2131769 - Post upgrade to 6.11.z, DHCP error with wrong number of arguments for validate_supported_address
2131771 - With every edit of an exising webhook, the value in password field disappears in Satellite 6.10/6.11/6.12
2131773 - foreman-maintain still enables ansible-2.9-for-rhel-8-x86_64-rpms repository for running an update to 6.11.z when no packages are installed from that repository
2131776 - please update to Satellite Ansible Collection 3.6.0
2131781 - ‘candlepin-validate-db’ pre-upgrade check fails with “Could not open SSL root certificate file /root/.postgresql/root.crt” error for external DB setup with SSL
2131788 - Documentation bug for the compute_resource module
2131790 - [BUG] Invalid choice for template_kind listed for os_default_template module
2132075 - CVE-2022-31163 tfm-rubygem-tzinfo: rubygem-tzinfo: arbitrary code execution [rhn_satellite_6.11]
2132076 - CVE-2022-31163 rubygem-tzinfo: rubygem-tzinfo: arbitrary code execution [rhn_satellite_6.11]
2132079 - CVE-2022-30122 rubygem-rack: crafted multipart POST request may cause a DoS [rhn_satellite_6-default]
2122205 - Package “python3-pulp_manifest” is not available in Satellite Utils repository
2132999 - Satellite cannot be installed on RHEL 8.7
CVEs
CVE-2022-30122
CVE-2022-31163
Users of Red Hat Satellite are advised to upgrade to these updated packages, which fix these bugs.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
RedHat | 7 | noarch | foreman-ec2 | < 3.1.1.25-1.el7sat | foreman-ec2-3.1.1.25-1.el7sat.noarch.rpm |
RedHat | 8 | noarch | rubygem-foreman_maintain | < 1.0.18-1.el8sat | rubygem-foreman_maintain-1.0.18-1.el8sat.noarch.rpm |
RedHat | 8 | noarch | foreman-service | < 3.1.1.25-1.el8sat | foreman-service-3.1.1.25-1.el8sat.noarch.rpm |
RedHat | 7 | noarch | foreman-dynflow-sidekiq | < 3.1.1.25-1.el7sat | foreman-dynflow-sidekiq-3.1.1.25-1.el7sat.noarch.rpm |
RedHat | 8 | noarch | rubygem-katello | < 4.3.0.50-1.el8sat | rubygem-katello-4.3.0.50-1.el8sat.noarch.rpm |
RedHat | 8 | noarch | ansible-collection-redhat-satellite | < 3.6.0-3.el8sat | ansible-collection-redhat-satellite-3.6.0-3.el8sat.noarch.rpm |
RedHat | 8 | noarch | foreman-cli | < 3.1.1.25-1.el8sat | foreman-cli-3.1.1.25-1.el8sat.noarch.rpm |
RedHat | 7 | noarch | foreman-vmware | < 3.1.1.25-1.el7sat | foreman-vmware-3.1.1.25-1.el7sat.noarch.rpm |
RedHat | 8 | noarch | rubygem-rack | < 2.2.3.1-1.el8sat | rubygem-rack-2.2.3.1-1.el8sat.noarch.rpm |
RedHat | 7 | noarch | satellite-capsule | < 6.11.4-2.el7sat | satellite-capsule-6.11.4-2.el7sat.noarch.rpm |
8.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
5.1 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
HIGH
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:H/Au:N/C:P/I:P/A:P
0.003 Low
EPSS
Percentile
68.1%