-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================                   Red Hat Security Advisory

Synopsis:          Moderate: Satellite 6.10.2 Async Bug Fix Update
Advisory ID:       RHSA-2022:0190-01
Product:           Red Hat Satellite 6
Advisory URL:      https://access.redhat.com/errata/RHSA-2022:0190
Issue date:        2022-01-19
CVE Names:         CVE-2021-21290 
====================================================================
1. Summary:

Updated Satellite 6.10 packages that fix several bugs are now available for
Red Hat Satellite.

2. Relevant releases/architectures:

Red Hat Satellite 6.10 - noarch, x86_64
Red Hat Satellite Capsule 6.10 - noarch, x86_64

3. Description:

Red Hat Satellite is a system management solution that allows organizations
to configure and maintain their systems without the necessity to provide
public Internet access to their servers or other client systems. It
performs provisioning and configuration management of predefined standard
operating environments.

Security Fix(es):

1927028 - candlepin: netty: Information disclosure via the local system
temporary directory (CVE-2021-21290)

This update fixes the following bugs:

2016047 - Uploading a duplicate file fails with undefined local variable or
method upload_href for
#
2027347 - Satellite 6.10 upgrade fails with PG::NotNullViolation: ERROR:
column "subscription_id" contains null values
2027354 - Using Satellite with a proxy produces an SELinux alert
2027358 - Large CRL file operation causes OOM error in Candlepin
2027817 - [BUG] Upgrading Satellite 6.9 with custom certificates to
Satellite 6.10 beta will cause the same problem to occur as BZ# 1961886
2030445 - Failed at scanning for repository: undefined method
`resolve_substitutions' for nil:NilClass
2030448 - Capsule sync task failed to refresh repo that doesn't have feed
url with "bad argument (expected URI object or URI string)" error

Users of Red Hat Satellite are advised to upgrade to these updated
packages, which fix these bugs.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For detailed instructions how to apply this update, refer to:

https://access.redhat.com/documentation/en-us/red_hat_satellite/6.10/html/upgrading_and_updating_red_hat_satellite/updating_satellite_server_capsule_server_and_content_hosts

5. Bugs fixed (https://bugzilla.redhat.com/):

1927028 - CVE-2021-21290 netty: Information disclosure via the local system temporary directory
2016047 - uploading a duplicate file fails with undefined local variable or method upload_href for #
2027347 - Satellite 6.10 upgrade fails with PG::NotNullViolation: ERROR:  column "subscription_id" contains null values
2027354 - Using Satellite with a proxy produces an SELinux alert
2027358 - Large CRL file operation causes OOM error in Candlepin
2027817 - [BUG] Upgrading Satellite 6.9 with custom certificates to Satellite 6.10 beta will cause the same problem to occur as BZ# 1961886
2030445 - Failed at scanning for repository: undefined method `resolve_substitutions' for nil:NilClass
2030448 - Capsule sync task failed to refresh repo that doesn't have feed url with "bad argument (expected URI object or URI string)" error

6. Package List:

Red Hat Satellite Capsule 6.10:

Source:
pulpcore-selinux-1.2.7-1.el7pc.src.rpm
satellite-6.10.2-1.el7sat.src.rpm

noarch:
satellite-capsule-6.10.2-1.el7sat.noarch.rpm
satellite-common-6.10.2-1.el7sat.noarch.rpm

x86_64:
pulpcore-selinux-1.2.7-1.el7pc.x86_64.rpm

Red Hat Satellite 6.10:

Source:
pulpcore-selinux-1.2.7-1.el7pc.src.rpm
satellite-6.10.2-1.el7sat.src.rpm
tfm-rubygem-katello-4.1.1.42-1.el7sat.src.rpm

noarch:
satellite-6.10.2-1.el7sat.noarch.rpm
satellite-cli-6.10.2-1.el7sat.noarch.rpm
satellite-common-6.10.2-1.el7sat.noarch.rpm
tfm-rubygem-katello-4.1.1.42-1.el7sat.noarch.rpm

x86_64:
pulpcore-selinux-1.2.7-1.el7pc.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2021-21290
https://access.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2022 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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w+yj
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2022-0190:04 Moderate: Satellite 6.10.2 Async Bug Fix Update

Updated Satellite 6.10 packages that fix several bugs are now available for Red Hat Satellite

Summary

Red Hat Satellite is a system management solution that allows organizations to configure and maintain their systems without the necessity to provide public Internet access to their servers or other client systems. It performs provisioning and configuration management of predefined standard operating environments.
Security Fix(es):
1927028 - candlepin: netty: Information disclosure via the local system temporary directory (CVE-2021-21290)
This update fixes the following bugs:
2016047 - Uploading a duplicate file fails with undefined local variable or method upload_href for # 2027347 - Satellite 6.10 upgrade fails with PG::NotNullViolation: ERROR: column "subscription_id" contains null values 2027354 - Using Satellite with a proxy produces an SELinux alert 2027358 - Large CRL file operation causes OOM error in Candlepin 2027817 - [BUG] Upgrading Satellite 6.9 with custom certificates to Satellite 6.10 beta will cause the same problem to occur as BZ# 1961886 2030445 - Failed at scanning for repository: undefined method `resolve_substitutions' for nil:NilClass 2030448 - Capsule sync task failed to refresh repo that doesn't have feed url with "bad argument (expected URI object or URI string)" error
Users of Red Hat Satellite are advised to upgrade to these updated packages, which fix these bugs.



Summary


Solution

Before applying this update, make sure all previously released errata relevant to your system have been applied.
For detailed instructions how to apply this update, refer to:
https://access.redhat.com/documentation/en-us/red_hat_satellite/6.10/html/upgrading_and_updating_red_hat_satellite/updating_satellite_server_capsule_server_and_content_hosts

References

https://access.redhat.com/security/cve/CVE-2021-21290 https://access.redhat.com/security/updates/classification/#moderate

Package List

Red Hat Satellite Capsule 6.10:
Source: pulpcore-selinux-1.2.7-1.el7pc.src.rpm satellite-6.10.2-1.el7sat.src.rpm
noarch: satellite-capsule-6.10.2-1.el7sat.noarch.rpm satellite-common-6.10.2-1.el7sat.noarch.rpm
x86_64: pulpcore-selinux-1.2.7-1.el7pc.x86_64.rpm
Red Hat Satellite 6.10:
Source: pulpcore-selinux-1.2.7-1.el7pc.src.rpm satellite-6.10.2-1.el7sat.src.rpm tfm-rubygem-katello-4.1.1.42-1.el7sat.src.rpm
noarch: satellite-6.10.2-1.el7sat.noarch.rpm satellite-cli-6.10.2-1.el7sat.noarch.rpm satellite-common-6.10.2-1.el7sat.noarch.rpm tfm-rubygem-katello-4.1.1.42-1.el7sat.noarch.rpm
x86_64: pulpcore-selinux-1.2.7-1.el7pc.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/


Severity
Advisory ID: RHSA-2022:0190-01
Product: Red Hat Satellite 6
Advisory URL: https://access.redhat.com/errata/RHSA-2022:0190
Issued Date: : 2022-01-19
CVE Names: CVE-2021-21290

Topic

Updated Satellite 6.10 packages that fix several bugs are now available forRed Hat Satellite.


Topic


 

Relevant Releases Architectures

Red Hat Satellite 6.10 - noarch, x86_64

Red Hat Satellite Capsule 6.10 - noarch, x86_64


Bugs Fixed

1927028 - CVE-2021-21290 netty: Information disclosure via the local system temporary directory

2016047 - uploading a duplicate file fails with undefined local variable or method upload_href for #

2027347 - Satellite 6.10 upgrade fails with PG::NotNullViolation: ERROR: column "subscription_id" contains null values

2027354 - Using Satellite with a proxy produces an SELinux alert

2027358 - Large CRL file operation causes OOM error in Candlepin

2027817 - [BUG] Upgrading Satellite 6.9 with custom certificates to Satellite 6.10 beta will cause the same problem to occur as BZ# 1961886

2030445 - Failed at scanning for repository: undefined method `resolve_substitutions' for nil:NilClass

2030448 - Capsule sync task failed to refresh repo that doesn't have feed url with "bad argument (expected URI object or URI string)" error


Related News