Headline
Red Hat Security Advisory 2023-0261-02
Red Hat Security Advisory 2023-0261-02 - Red Hat Satellite is a system management solution that allows organizations to configure and maintain their systems without the necessity to provide public Internet access to their servers or other client systems. It performs provisioning and configuration management of predefined standard operating environments.
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: Satellite 6.12.1 Async Security Update
Advisory ID: RHSA-2023:0261-02
Product: Red Hat Satellite 6
Advisory URL: https://access.redhat.com/errata/RHSA-2023:0261
Issue date: 2023-01-18
CVE Names: CVE-2022-32224 CVE-2022-42889
=====================================================================
- Summary:
Updated Satellite 6.12 packages that fixes critical security bugs and
several regular bugs are now available for Red Hat Satellite.
- Relevant releases/architectures:
Red Hat Satellite 6.12 for RHEL 8 - noarch
- Description:
Red Hat Satellite is a system management solution that allows organizations
to configure and maintain their systems without the necessity to provide
public Internet access to their servers or other client systems. It
performs provisioning and configuration management of predefined standard
operating environments.
Security fix(es):
tfm-rubygem-activerecord: activerecord: Possible RCE escalation bug with
Serialized Columns in Active Record (CVE-2022-32224)
candlepin: apache-commons-text: variable interpolation RCE (CVE-2022-42889)
This update fixes the following bugs:
2082209 - Another deadlock issue when syncing repos with high concurrency
2141308 - It appears that the egg is downloaded every time
2150069 - With every edit of an exising webhook, the value in password
field disappears in Satellite 6.10/6.11/6.12
2150108 - Satellite-clone not working if ansible-core 2.13 is installed
2150111 - Insights recommendation sync failing in Satelliite
2150112 - Random failure of Inventory Sync
2150114 - Insights-client --register --verbose throwing error
UnicodeEncodeError: ‘ascii’ codec can’t encode character ‘\ufffd’ in
position 94: ordinal not in range(128)
2150118 - Error “no certificate or crl found” when using a http proxy as
“Default Http Proxy” for content syncing or manifest operations in
Satellite 6.12
2150119 - Content view publish fails when the content view and repository
both have a large name with : Error message: the server returns an error
HTTP status code: 500
2150123 = Inspecting an image with skopeo no longer works on Capsules
2150125 - Syncable exports across partitions causes ' Invalid cross-device
link’ error
2150120 - Upgrade to Satellite 6.12 may fail to apply
RemoveDrpmFromIgnorableContent migration if erratum is also a ignorable
content type for any repo
Users of Red Hat Satellite are advised to upgrade to these updated
packages, which fix these bugs.
- Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
- Bugs fixed (https://bugzilla.redhat.com/):
2082209 - Another deadlock issue when syncing repos with high concurrency
2108997 - CVE-2022-32224 activerecord: Possible RCE escalation bug with Serialized Columns in Active Record
2135435 - CVE-2022-42889 apache-commons-text: variable interpolation RCE
2141308 - It appears that the egg is downloaded every time
2150069 - With every edit of an exising webhook, the value in password field disappears in Satellite 6.10/6.11/6.12
2150108 - Satellite-clone not working if ansible-core 2.13 is installed
2150111 - Insights recommendation sync failing in Satelliite
2150112 - random failure of Inventory Sync
2150114 - insights-client --register --verbose throwing error UnicodeEncodeError: ‘ascii’ codec can’t encode character ‘\ufffd’ in position 94: ordinal not in range(128)
2150118 - Error “no certificate or crl found” when using a http proxy as “Default Http Proxy” for content syncing or manifest operations in Satellite 6.12
2150119 - Content view publish fails when the content view and repository both have a large name with : Error message: the server returns an error HTTP status code: 500
2150120 - Upgrade to Satellite 6.12 may fail to apply RemoveDrpmFromIgnorableContent migration if erratum is also a ignorable content type for any repo
2150123 - Inspecting an image with skopeo no longer works on Capsules
2150125 - Syncable exports across partitions causes ' Invalid cross-device link’ error
- Package List:
Red Hat Satellite 6.12 for RHEL 8:
Source:
candlepin-4.1.18-1.el8sat.src.rpm
foreman-3.3.0.18-1.el8sat.src.rpm
python-pulp-container-2.10.10-1.el8pc.src.rpm
python-pulp-rpm-3.18.9-1.el8pc.src.rpm
python-pulpcore-3.18.11-1.el8pc.src.rpm
rubygem-actioncable-6.0.6-2.el8sat.src.rpm
rubygem-actionmailbox-6.0.6-2.el8sat.src.rpm
rubygem-actionmailer-6.0.6-2.el8sat.src.rpm
rubygem-actionpack-6.0.6-2.el8sat.src.rpm
rubygem-actiontext-6.0.6-2.el8sat.src.rpm
rubygem-actionview-6.0.6-2.el8sat.src.rpm
rubygem-activejob-6.0.6-2.el8sat.src.rpm
rubygem-activemodel-6.0.6-2.el8sat.src.rpm
rubygem-activerecord-6.0.6-2.el8sat.src.rpm
rubygem-activestorage-6.0.6-2.el8sat.src.rpm
rubygem-activesupport-6.0.6-1.el8sat.src.rpm
rubygem-foreman_rh_cloud-6.0.44-1.el8sat.src.rpm
rubygem-foreman_webhooks-3.0.5-1.1.el8sat.src.rpm
rubygem-katello-4.5.0.22-1.el8sat.src.rpm
rubygem-rails-6.0.6-2.el8sat.src.rpm
rubygem-railties-6.0.6-2.el8sat.src.rpm
rubygem-smart_proxy_container_gateway-1.0.7-1.el8sat.src.rpm
satellite-6.12.1-1.el8sat.src.rpm
noarch:
candlepin-4.1.18-1.el8sat.noarch.rpm
candlepin-selinux-4.1.18-1.el8sat.noarch.rpm
foreman-3.3.0.18-1.el8sat.noarch.rpm
foreman-cli-3.3.0.18-1.el8sat.noarch.rpm
foreman-debug-3.3.0.18-1.el8sat.noarch.rpm
foreman-dynflow-sidekiq-3.3.0.18-1.el8sat.noarch.rpm
foreman-ec2-3.3.0.18-1.el8sat.noarch.rpm
foreman-gce-3.3.0.18-1.el8sat.noarch.rpm
foreman-journald-3.3.0.18-1.el8sat.noarch.rpm
foreman-libvirt-3.3.0.18-1.el8sat.noarch.rpm
foreman-openstack-3.3.0.18-1.el8sat.noarch.rpm
foreman-ovirt-3.3.0.18-1.el8sat.noarch.rpm
foreman-postgresql-3.3.0.18-1.el8sat.noarch.rpm
foreman-service-3.3.0.18-1.el8sat.noarch.rpm
foreman-telemetry-3.3.0.18-1.el8sat.noarch.rpm
foreman-vmware-3.3.0.18-1.el8sat.noarch.rpm
python39-pulp-container-2.10.10-1.el8pc.noarch.rpm
python39-pulp-rpm-3.18.9-1.el8pc.noarch.rpm
python39-pulpcore-3.18.11-1.el8pc.noarch.rpm
rubygem-actioncable-6.0.6-2.el8sat.noarch.rpm
rubygem-actionmailbox-6.0.6-2.el8sat.noarch.rpm
rubygem-actionmailer-6.0.6-2.el8sat.noarch.rpm
rubygem-actionpack-6.0.6-2.el8sat.noarch.rpm
rubygem-actiontext-6.0.6-2.el8sat.noarch.rpm
rubygem-actionview-6.0.6-2.el8sat.noarch.rpm
rubygem-activejob-6.0.6-2.el8sat.noarch.rpm
rubygem-activemodel-6.0.6-2.el8sat.noarch.rpm
rubygem-activerecord-6.0.6-2.el8sat.noarch.rpm
rubygem-activestorage-6.0.6-2.el8sat.noarch.rpm
rubygem-activesupport-6.0.6-1.el8sat.noarch.rpm
rubygem-foreman_rh_cloud-6.0.44-1.el8sat.noarch.rpm
rubygem-foreman_webhooks-3.0.5-1.1.el8sat.noarch.rpm
rubygem-katello-4.5.0.22-1.el8sat.noarch.rpm
rubygem-rails-6.0.6-2.el8sat.noarch.rpm
rubygem-railties-6.0.6-2.el8sat.noarch.rpm
rubygem-smart_proxy_container_gateway-1.0.7-1.el8sat.noarch.rpm
satellite-6.12.1-1.el8sat.noarch.rpm
satellite-cli-6.12.1-1.el8sat.noarch.rpm
satellite-common-6.12.1-1.el8sat.noarch.rpm
Red Hat Satellite 6.12 for RHEL 8:
Source:
foreman-3.3.0.18-1.el8sat.src.rpm
python-pulp-container-2.10.10-1.el8pc.src.rpm
python-pulp-rpm-3.18.9-1.el8pc.src.rpm
python-pulpcore-3.18.11-1.el8pc.src.rpm
rubygem-smart_proxy_container_gateway-1.0.7-1.el8sat.src.rpm
satellite-6.12.1-1.el8sat.src.rpm
noarch:
foreman-debug-3.3.0.18-1.el8sat.noarch.rpm
python39-pulp-container-2.10.10-1.el8pc.noarch.rpm
python39-pulp-rpm-3.18.9-1.el8pc.noarch.rpm
python39-pulpcore-3.18.11-1.el8pc.noarch.rpm
rubygem-smart_proxy_container_gateway-1.0.7-1.el8sat.noarch.rpm
satellite-capsule-6.12.1-1.el8sat.noarch.rpm
satellite-common-6.12.1-1.el8sat.noarch.rpm
Red Hat Satellite 6.12 for RHEL 8:
Source:
satellite-clone-3.2.0-2.el8sat.src.rpm
noarch:
satellite-clone-3.2.0-2.el8sat.noarch.rpm
Red Hat Satellite 6.12 for RHEL 8:
Source:
foreman-3.3.0.18-1.el8sat.src.rpm
satellite-6.12.1-1.el8sat.src.rpm
noarch:
foreman-cli-3.3.0.18-1.el8sat.noarch.rpm
satellite-cli-6.12.1-1.el8sat.noarch.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2022-32224
https://access.redhat.com/security/cve/CVE-2022-42889
https://access.redhat.com/security/updates/classification/#critical
- Contact:
The Red Hat security contact is [email protected]. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2023 Red Hat, Inc.
RHSA-announce mailing list
[email protected]
https://listman.redhat.com/mailman/listinfo/rhsa-announce
Related news
Gentoo Linux Security Advisory 202408-24 - A vulnerability has been discovered in Ruby on Rails, which can lead to remote code execution via serialization of data. Versions greater than or equal to 6.1.6.1:6.1 are affected.
Red Hat Security Advisory 2024-3527-03 - Red Hat AMQ Streams 2.7.0 is now available from the Red Hat Customer Portal. Issues addressed include buffer overflow, denial of service, integer overflow, memory leak, and resource exhaustion vulnerabilities.
This Metasploit module exploit takes advantage of the StringSubstitutor interpolator class, which is included in the Commons Text library. A default interpolator allows for string lookups that can lead to remote code execution. This is due to a logic flaw that makes the script, dns and url lookup keys interpolated by default, as opposed to what it should be, according to the documentation of the StringLookupFactory class. Those keys allow an attacker to execute arbitrary code via lookups primarily using the script key. In order to exploit the vulnerabilities, the following requirements must be met: Run a version of Apache Commons Text from version 1.5 to 1.9, use the StringSubstitutor interpolator, and the target should run JDK versions prior to 15.
Missing HTTP headers (X-Frame-Options, Content-Security-Policy) in KNIME Business Hub before 1.4.0 has left users vulnerable to click jacking. Clickjacking is an attack that occurs when an attacker uses a transparent iframe in a window to trick a user into clicking on an actionable item, such as a button or link, to another server in which they have an identical webpage. The attacker essentially hijacks the user activity intended for the original server and sends them to the other server.
Multicluster Engine for Kubernetes 2.2.4 General Availability release images, which fix security issues and update container images. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-32313: A flaw was found in the vm2. After making a vm, the inspect method is read-write for console.log, which allows an attacker to edit options for console.log. This issue impacts the integrity by changing the log subsystem. * CVE-2023-32314: A flaw was found in the vm2 sandbox. When a host ...
Red Hat Security Advisory 2023-3195-01 - Jenkins is a continuous integration server that monitors executions of repeated jobs, such as building a software project or jobs run by cron. Issues addressed include bypass, cross site scripting, information leakage, and insecure permissions vulnerabilities.
Red Hat Security Advisory 2023-3198-01 - Jenkins is a continuous integration server that monitors executions of repeated jobs, such as building a software project or jobs run by cron. Issues addressed include bypass, code execution, cross site request forgery, cross site scripting, denial of service, deserialization, information leakage, and insecure permissions vulnerabilities.
Red Hat Security Advisory 2023-2097-03 - Red Hat Satellite is a systems management tool for Linux-based infrastructure. It allows for provisioning, remote management, and monitoring of multiple Linux deployments with a single centralized tool. Issues addressed include code execution, cross site scripting, denial of service, deserialization, improper neutralization, information leakage, and remote shell upload vulnerabilities.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through...
Red Hat Security Advisory 2023-1656-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.10.56.
Red Hat OpenShift Container Platform release 4.9.59 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-20329: A flaw was found in Mongo. Specific cstrings input may not be properly validated in the MongoDB Go Driver when marshaling Go objects into BSON. This flaw allows a malicious user to use a Go object with a specific string to inject additional fields into marshaled documen...
Red Hat Security Advisory 2023-1151-01 - Red Hat Satellite is a system management solution that allows organizations to configure and maintain their systems without the necessity to provide public Internet access to their servers or other client systems. It performs provisioning and configuration management of predefined standard operating environments.
Updated Satellite 6.11 packages that fixes critical security bugs and several regular bugs are now available for Red Hat Satellite.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-32224: An insecure deserialization flaw was found in Active Record, which uses YAML.unsafe_load to convert the YAML data into Ruby objects. An attacker supplying crafted data to the database can perform remote code execution (RCE), resulting in complete system compromise.
SQL Injection vulnerability in Talend ESB Runtime 7.3.1-R2022-09-RT thru 8.0.1-R2022-10-RT when using the provisioning service.
Red Hat Security Advisory 2023-0469-01 - Red Hat Integration Camel Extensions for Quarkus 2.13.2 is now available. Issues addressed include denial of service and memory exhaustion vulnerabilities.
Red Hat Integration Camel Extensions for Quarkus 2.13.2 is now available. The purpose of this text-only errata is to inform you about the security issues fixed. Red Hat Product Security has rated this update as having an impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-40149: jettison: parser crash by stackoverflow * CVE-2022-40150: jettison: memory exhaustion via user-supplied XML or JSON data * CVE-2022-40151: xstream: Xstream to serialise XML data was vulnerable to Denial of Service attacks * CVE-2022-40152: woodstox-core: woodstox to...
Updated Satellite 6.12 packages that fixes critical security bugs and several regular bugs are now available for Red Hat Satellite.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-32224: activerecord: Possible RCE escalation bug with Serialized Columns in Active Record * CVE-2022-42889: apache-commons-text: variable interpolation RCE
Vulnerability in the Oracle Demantra Demand Management product of Oracle Supply Chain (component: E-Business Collections). Supported versions that are affected are 12.1 and 12.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Demantra Demand Management. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Demantra Demand Management accessible data. CVSS 3.1 Base Score 7.5 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).
Gentoo Linux Security Advisory 202301-5 - A vulnerability has been discovered in Apache Commons Text which could result in arbitrary code execution. Versions less than 1.10.0 are affected.
IBM Security Guardium 11.4 could allow a privileged user to obtain sensitive information inside of an HTTP response. IBM X-Force ID: 235405.
Red Hat Security Advisory 2022-8876-01 - AMQ Broker is a high-performance messaging implementation based on ActiveMQ Artemis. It uses an asynchronous journal for fast message persistence, and supports multiple languages, protocols, and platforms. This release of Red Hat AMQ Broker 7.10.2 includes security and bug fixes, and enhancements. For further information, refer to the release notes linked to in the References section. Issues addressed include a denial of service vulnerability.
A possible escalation to RCE vulnerability exists when using YAML serialized columns in Active Record < 7.0.3.1, <6.1.6.1, <6.0.5.1 and <5.2.8.1 which could allow an attacker, that can manipulate data in the database (via means like SQL injection), the ability to escalate to an RCE.
A directory traversal vulnerability in the ZIP archive extraction routines of KNIME Analytics Platform 3.2.0 and above can result in arbitrary files being overwritten on the user's system. This vulnerability is also known as 'Zip-Slip'. An attacker can create a KNIME workflow that, when being opened by a user, can overwrite arbitrary files that the user has write access to. It's not necessary to execute the workflow, opening the workflow is sufficient. The user will notice that something is wrong because an error is being reported but only after the files have already been written. This can impact data integrity (file contents are changed) or cause errors in other software (vital files being corrupted). It can even lead to remote code execution if executable files are being replaced and subsequently executed by the user. In all cases the attacker has to know the location of files on the user's system, though.
The good news: The Apache Commons Text library bug is far less likely to lead to exploitation than last year's Log4j library flaw.
WordPress security company Wordfence on Thursday said it started detecting exploitation attempts targeting the newly disclosed flaw in Apache Commons Text on October 18, 2022. The vulnerability, tracked as CVE-2022-42889 aka Text4Shell, has been assigned a severity ranking of 9.8 out of a possible 10.0 on the CVSS scale and affects versions 1.5 through 1.9 of the library. It's also similar to
Log4Shell-like bug is serious but less dangerous than notorious Log4j vulnerability
There's nothing yet to suggest CVE-2022-42889 is the next Log4j. But proof-of-concept code is available, and interest appears to be ticking up.
Apache Commons Text performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is "${prefix:name}", where "prefix" is used to locate an instance of org.apache.commons.text.lookup.StringLookup that performs the interpolation. Starting with version 1.5 and continuing through 1.9, the set of default Lookup instances included interpolators that could result in arbitrary code execution or contact with remote servers. These lookups are: - "script" - execute expressions using the JVM script execution engine (javax.script) - "dns" - resolve dns records - "url" - load values from urls, including from remote servers Applications using the interpolation defaults in the affected versions may be vulnerable to remote code execution or unintentional contact with remote servers if untrusted configuration values are used. Users are recommended to upgrade to Apache Commons Text 1.10.0, which disables the problematic interpolators ...
Apache Commons Text performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is "${prefix:name}", where "prefix" is used to locate an instance of org.apache.commons.text.lookup.StringLookup that performs the interpolation. Starting with version 1.5 and continuing through 1.9, the set of default Lookup instances included interpolators that could result in arbitrary code execution or contact with remote servers. These lookups are: - "script" - execute expressions using the JVM script execution engine (javax.script) - "dns" - resolve dns records - "url" - load values from urls, including from remote servers Applications using the interpolation defaults in the affected versions may be vulnerable to remote code execution or unintentional contact with remote servers if untrusted configuration values are used. Users are recommended to upgrade to Apache Commons Text 1.10.0, which disables the problematic interpolator...
Arvados is an open source platform for managing, processing, and sharing genomic and other large scientific and biomedical data. A remote code execution (RCE) vulnerability in the Arvados Workbench allows authenticated attackers to execute arbitrary code via specially crafted JSON payloads. This exists in all versions up to 2.4.1 and is fixed in 2.4.2. This vulnerability is specific to the Ruby on Rails Workbench application (“Workbench 1”). We do not believe any other Arvados components, including the TypesScript browser-based Workbench application (“Workbench 2”) or API Server, are vulnerable to this attack. For versions of Arvados earlier than 2.4.2: remove the Ruby-based "Workbench 1" app ("apt-get remove arvados-workbench") from your installation as a workaround.
When serialized columns that use YAML (the default) are deserialized, Rails uses YAML.unsafe_load to convert the YAML data in to Ruby objects. If an attacker can manipulate data in the database (via means like SQL injection), then it may be possible for the attacker to escalate to an RCE. There are no feasible workarounds for this issue, but other coders (such as JSON) are not impacted.
In affected Ops Manager versions there is an exposed http route was that may allow attackers to view a specific access log of a publicly exposed Ops Manager instance. This issue affects: MongoDB Inc. MongoDB Ops Manager 4.0 versions 4.0.9, 4.0.10 and MongoDB Ops Manager 4.1 version 4.1.5.