Security
Headlines
HeadlinesLatestCVEs

Headline

Red Hat Security Advisory 2023-1151-01

Red Hat Security Advisory 2023-1151-01 - Red Hat Satellite is a system management solution that allows organizations to configure and maintain their systems without the necessity to provide public Internet access to their servers or other client systems. It performs provisioning and configuration management of predefined standard operating environments.

Packet Storm
#sql#linux#red_hat#rce#vmware#ruby#rpm#postgres#docker

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================
Red Hat Security Advisory

Synopsis: Critical: Satellite 6.11.5 Async Security Update
Advisory ID: RHSA-2023:1151-01
Product: Red Hat Satellite 6
Advisory URL: https://access.redhat.com/errata/RHSA-2023:1151
Issue date: 2023-03-07
CVE Names: CVE-2022-32224
====================================================================

  1. Summary:

Updated Satellite 6.11 packages that fixes critical security bugs and
several
regular bugs are now available for Red Hat Satellite.

  1. Relevant releases/architectures:

Red Hat Satellite 6.11 for RHEL 7 - noarch
Red Hat Satellite 6.11 for RHEL 8 - noarch

  1. Description:

Red Hat Satellite is a system management solution that allows organizations
to configure and maintain their systems without the necessity to provide
public Internet access to their servers or other client systems. It
performs provisioning and configuration management of predefined standard
operating environments.

Security fix(es):

tfm-rubygem-activerecord: activerecord: Possible RCE escalation bug with
Serialized Columns in Active Record (CVE-2022-32224)

This update fixes the following bugs:

2153877 - The “Documentation” button on Satellite 6.11 for “Provisioning
Templates” page is pointing to 404 Page Not Found link
2161929 - Locale change caused by RHEL upgrade results in database index
corruption “get() returned more than one Modulemd – it returned 2!”
2166747 - unable to install satellite 6.11 on rhel8.8 - ansible-core
version is too new
2166748 - Entitlement certificate is missing content section for a custom
product
2166749 - Sync container images of existing docker type repositories fail
with 404 - Not found
2166750 - Another deadlock issue when syncing repos with high concurrency
2166756 - Inspecting an image with skopeo no longer works on Capsules
2166757 - Content view filter included errata not in the filter date range
2166759 - Content view filter will include module streams of other
repos/arches if the errata contain rpms in different repos/arches.
2166760 - Even in 6.11.1, sync summary email notification shows the
incorrect summary for newly added errata.
2166761 - Content view publish fails when the content view and repository
both have a large name with : Error message: the server returns an error
HTTP status code: 500
2166762 - Insights recommendation sync failing in Satelliite
2170874 - Satellite-clone not working if ansible-core 2.13 is installed

Users of Red Hat Satellite are advised to upgrade to these updated
packages, which fix these bugs.

  1. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

  1. Bugs fixed (https://bugzilla.redhat.com/):

2108997 - CVE-2022-32224 activerecord: Possible RCE escalation bug with Serialized Columns in Active Record
2153877 - The “Documentation” button on Satellite 6.11 for “Provisioning Templates” page is pointing to 404 Page Not Found link
2161929 - Locale change caused by RHEL upgrade results in database index corruption “get() returned more than one Modulemd – it returned 2!”
2166747 - unable to install satellite 6.11 on rhel8.8 - ansible-core version is too new
2166748 - Entitlement certificate is missing content section for a custom product
2166749 - Sync container images of existing docker type repositories fail with 404 - Not found
2166750 - Another deadlock issue when syncing repos with high concurrency
2166756 - Inspecting an image with skopeo no longer works on Capsules
2166757 - Content view filter included errata not in the filter date range
2166759 - Content view filter will include module streams of other repos/arches if the errata contain rpms in different repos/arches.
2166760 - Even in 6.11.1, sync summary email notification shows the incorrect summary for newly added errata.
2166761 - Content view publish fails when the content view and repository both have a large name with : Error message: the server returns an error HTTP status code: 500
2166762 - Insights recommendation sync failing in Satelliite
2170874 - Satellite-clone not working if ansible-core 2.13 is installed

  1. Package List:

Red Hat Satellite 6.11 for RHEL 7:

Source:
candlepin-4.1.19-1.el7sat.src.rpm
foreman-3.1.1.26-1.el7sat.src.rpm
rubygem-foreman_maintain-1.0.19-1.el7sat.src.rpm
satellite-6.11.5-1.el7sat.src.rpm
tfm-pulpcore-python-naya-1.1.1-1.1.el7pc.src.rpm
tfm-pulpcore-python-pulp-container-2.9.9-1.el7pc.src.rpm
tfm-pulpcore-python-pulpcore-3.16.15-1.el7pc.src.rpm
tfm-rubygem-actioncable-6.0.6-2.el7sat.src.rpm
tfm-rubygem-actionmailbox-6.0.6-2.el7sat.src.rpm
tfm-rubygem-actionmailer-6.0.6-2.el7sat.src.rpm
tfm-rubygem-actionpack-6.0.6-2.el7sat.src.rpm
tfm-rubygem-actiontext-6.0.6-2.el7sat.src.rpm
tfm-rubygem-actionview-6.0.6-2.el7sat.src.rpm
tfm-rubygem-activejob-6.0.6-2.el7sat.src.rpm
tfm-rubygem-activemodel-6.0.6-2.el7sat.src.rpm
tfm-rubygem-activerecord-6.0.6-2.el7sat.src.rpm
tfm-rubygem-activestorage-6.0.6-2.el7sat.src.rpm
tfm-rubygem-activesupport-6.0.6-1.el7sat.src.rpm
tfm-rubygem-foreman_rh_cloud-5.0.44-1.el7sat.src.rpm
tfm-rubygem-foreman_theme_satellite-9.0.0.12-1.el7sat.src.rpm
tfm-rubygem-katello-4.3.0.52-1.el7sat.src.rpm
tfm-rubygem-rails-6.0.6-2.el7sat.src.rpm
tfm-rubygem-railties-6.0.6-2.el7sat.src.rpm
tfm-rubygem-smart_proxy_container_gateway-1.0.7-1.el7sat.src.rpm

noarch:
candlepin-4.1.19-1.el7sat.noarch.rpm
candlepin-selinux-4.1.19-1.el7sat.noarch.rpm
foreman-3.1.1.26-1.el7sat.noarch.rpm
foreman-cli-3.1.1.26-1.el7sat.noarch.rpm
foreman-debug-3.1.1.26-1.el7sat.noarch.rpm
foreman-dynflow-sidekiq-3.1.1.26-1.el7sat.noarch.rpm
foreman-ec2-3.1.1.26-1.el7sat.noarch.rpm
foreman-gce-3.1.1.26-1.el7sat.noarch.rpm
foreman-journald-3.1.1.26-1.el7sat.noarch.rpm
foreman-libvirt-3.1.1.26-1.el7sat.noarch.rpm
foreman-openstack-3.1.1.26-1.el7sat.noarch.rpm
foreman-ovirt-3.1.1.26-1.el7sat.noarch.rpm
foreman-postgresql-3.1.1.26-1.el7sat.noarch.rpm
foreman-service-3.1.1.26-1.el7sat.noarch.rpm
foreman-telemetry-3.1.1.26-1.el7sat.noarch.rpm
foreman-vmware-3.1.1.26-1.el7sat.noarch.rpm
rubygem-foreman_maintain-1.0.19-1.el7sat.noarch.rpm
satellite-6.11.5-1.el7sat.noarch.rpm
satellite-cli-6.11.5-1.el7sat.noarch.rpm
satellite-common-6.11.5-1.el7sat.noarch.rpm
tfm-pulpcore-python3-naya-1.1.1-1.1.el7pc.noarch.rpm
tfm-pulpcore-python3-pulp-container-2.9.9-1.el7pc.noarch.rpm
tfm-pulpcore-python3-pulpcore-3.16.15-1.el7pc.noarch.rpm
tfm-rubygem-actioncable-6.0.6-2.el7sat.noarch.rpm
tfm-rubygem-actionmailbox-6.0.6-2.el7sat.noarch.rpm
tfm-rubygem-actionmailer-6.0.6-2.el7sat.noarch.rpm
tfm-rubygem-actionpack-6.0.6-2.el7sat.noarch.rpm
tfm-rubygem-actiontext-6.0.6-2.el7sat.noarch.rpm
tfm-rubygem-actionview-6.0.6-2.el7sat.noarch.rpm
tfm-rubygem-activejob-6.0.6-2.el7sat.noarch.rpm
tfm-rubygem-activemodel-6.0.6-2.el7sat.noarch.rpm
tfm-rubygem-activerecord-6.0.6-2.el7sat.noarch.rpm
tfm-rubygem-activestorage-6.0.6-2.el7sat.noarch.rpm
tfm-rubygem-activesupport-6.0.6-1.el7sat.noarch.rpm
tfm-rubygem-foreman_rh_cloud-5.0.44-1.el7sat.noarch.rpm
tfm-rubygem-foreman_theme_satellite-9.0.0.12-1.el7sat.noarch.rpm
tfm-rubygem-katello-4.3.0.52-1.el7sat.noarch.rpm
tfm-rubygem-rails-6.0.6-2.el7sat.noarch.rpm
tfm-rubygem-railties-6.0.6-2.el7sat.noarch.rpm
tfm-rubygem-smart_proxy_container_gateway-1.0.7-1.el7sat.noarch.rpm

Red Hat Satellite 6.11 for RHEL 7:

Source:
foreman-3.1.1.26-1.el7sat.src.rpm
rubygem-foreman_maintain-1.0.19-1.el7sat.src.rpm
satellite-6.11.5-1.el7sat.src.rpm
tfm-pulpcore-python-naya-1.1.1-1.1.el7pc.src.rpm
tfm-pulpcore-python-pulp-container-2.9.9-1.el7pc.src.rpm
tfm-pulpcore-python-pulpcore-3.16.15-1.el7pc.src.rpm
tfm-rubygem-smart_proxy_container_gateway-1.0.7-1.el7sat.src.rpm

noarch:
foreman-debug-3.1.1.26-1.el7sat.noarch.rpm
rubygem-foreman_maintain-1.0.19-1.el7sat.noarch.rpm
satellite-capsule-6.11.5-1.el7sat.noarch.rpm
satellite-common-6.11.5-1.el7sat.noarch.rpm
tfm-pulpcore-python3-naya-1.1.1-1.1.el7pc.noarch.rpm
tfm-pulpcore-python3-pulp-container-2.9.9-1.el7pc.noarch.rpm
tfm-pulpcore-python3-pulpcore-3.16.15-1.el7pc.noarch.rpm
tfm-rubygem-smart_proxy_container_gateway-1.0.7-1.el7sat.noarch.rpm

Red Hat Satellite 6.11 for RHEL 7:

Source:
rubygem-foreman_maintain-1.0.19-1.el7sat.src.rpm
satellite-clone-3.1.1-2.el7sat.src.rpm

noarch:
rubygem-foreman_maintain-1.0.19-1.el7sat.noarch.rpm
satellite-clone-3.1.1-2.el7sat.noarch.rpm

Red Hat Satellite 6.11 for RHEL 7:

Source:
foreman-3.1.1.26-1.el7sat.src.rpm
satellite-6.11.5-1.el7sat.src.rpm

noarch:
foreman-cli-3.1.1.26-1.el7sat.noarch.rpm
satellite-cli-6.11.5-1.el7sat.noarch.rpm

Red Hat Satellite 6.11 for RHEL 8:

Source:
candlepin-4.1.19-1.el8sat.src.rpm
foreman-3.1.1.26-1.el8sat.src.rpm
python-naya-1.1.1-1.1.el8pc.src.rpm
python-pulp-container-2.9.9-1.el8pc.src.rpm
python-pulpcore-3.16.15-1.el8pc.src.rpm
rubygem-actioncable-6.0.6-2.el8sat.src.rpm
rubygem-actionmailbox-6.0.6-2.el8sat.src.rpm
rubygem-actionmailer-6.0.6-2.el8sat.src.rpm
rubygem-actionpack-6.0.6-2.el8sat.src.rpm
rubygem-actiontext-6.0.6-2.el8sat.src.rpm
rubygem-actionview-6.0.6-2.el8sat.src.rpm
rubygem-activejob-6.0.6-2.el8sat.src.rpm
rubygem-activemodel-6.0.6-2.el8sat.src.rpm
rubygem-activerecord-6.0.6-2.el8sat.src.rpm
rubygem-activestorage-6.0.6-2.el8sat.src.rpm
rubygem-activesupport-6.0.6-1.el8sat.src.rpm
rubygem-foreman_maintain-1.0.19-1.el8sat.src.rpm
rubygem-foreman_rh_cloud-5.0.44-1.el8sat.src.rpm
rubygem-foreman_theme_satellite-9.0.0.12-1.el8sat.src.rpm
rubygem-katello-4.3.0.52-1.el8sat.src.rpm
rubygem-rails-6.0.6-2.el8sat.src.rpm
rubygem-railties-6.0.6-2.el8sat.src.rpm
rubygem-smart_proxy_container_gateway-1.0.7-1.el8sat.src.rpm
satellite-6.11.5-1.el8sat.src.rpm

noarch:
candlepin-4.1.19-1.el8sat.noarch.rpm
candlepin-selinux-4.1.19-1.el8sat.noarch.rpm
foreman-3.1.1.26-1.el8sat.noarch.rpm
foreman-cli-3.1.1.26-1.el8sat.noarch.rpm
foreman-debug-3.1.1.26-1.el8sat.noarch.rpm
foreman-dynflow-sidekiq-3.1.1.26-1.el8sat.noarch.rpm
foreman-ec2-3.1.1.26-1.el8sat.noarch.rpm
foreman-gce-3.1.1.26-1.el8sat.noarch.rpm
foreman-journald-3.1.1.26-1.el8sat.noarch.rpm
foreman-libvirt-3.1.1.26-1.el8sat.noarch.rpm
foreman-openstack-3.1.1.26-1.el8sat.noarch.rpm
foreman-ovirt-3.1.1.26-1.el8sat.noarch.rpm
foreman-postgresql-3.1.1.26-1.el8sat.noarch.rpm
foreman-service-3.1.1.26-1.el8sat.noarch.rpm
foreman-telemetry-3.1.1.26-1.el8sat.noarch.rpm
foreman-vmware-3.1.1.26-1.el8sat.noarch.rpm
python38-naya-1.1.1-1.1.el8pc.noarch.rpm
python38-pulp-container-2.9.9-1.el8pc.noarch.rpm
python38-pulpcore-3.16.15-1.el8pc.noarch.rpm
rubygem-actioncable-6.0.6-2.el8sat.noarch.rpm
rubygem-actionmailbox-6.0.6-2.el8sat.noarch.rpm
rubygem-actionmailer-6.0.6-2.el8sat.noarch.rpm
rubygem-actionpack-6.0.6-2.el8sat.noarch.rpm
rubygem-actiontext-6.0.6-2.el8sat.noarch.rpm
rubygem-actionview-6.0.6-2.el8sat.noarch.rpm
rubygem-activejob-6.0.6-2.el8sat.noarch.rpm
rubygem-activemodel-6.0.6-2.el8sat.noarch.rpm
rubygem-activerecord-6.0.6-2.el8sat.noarch.rpm
rubygem-activestorage-6.0.6-2.el8sat.noarch.rpm
rubygem-activesupport-6.0.6-1.el8sat.noarch.rpm
rubygem-foreman_maintain-1.0.19-1.el8sat.noarch.rpm
rubygem-foreman_rh_cloud-5.0.44-1.el8sat.noarch.rpm
rubygem-foreman_theme_satellite-9.0.0.12-1.el8sat.noarch.rpm
rubygem-katello-4.3.0.52-1.el8sat.noarch.rpm
rubygem-rails-6.0.6-2.el8sat.noarch.rpm
rubygem-railties-6.0.6-2.el8sat.noarch.rpm
rubygem-smart_proxy_container_gateway-1.0.7-1.el8sat.noarch.rpm
satellite-6.11.5-1.el8sat.noarch.rpm
satellite-cli-6.11.5-1.el8sat.noarch.rpm
satellite-common-6.11.5-1.el8sat.noarch.rpm

Red Hat Satellite 6.11 for RHEL 8:

Source:
foreman-3.1.1.26-1.el8sat.src.rpm
python-naya-1.1.1-1.1.el8pc.src.rpm
python-pulp-container-2.9.9-1.el8pc.src.rpm
python-pulpcore-3.16.15-1.el8pc.src.rpm
rubygem-foreman_maintain-1.0.19-1.el8sat.src.rpm
rubygem-smart_proxy_container_gateway-1.0.7-1.el8sat.src.rpm
satellite-6.11.5-1.el8sat.src.rpm

noarch:
foreman-debug-3.1.1.26-1.el8sat.noarch.rpm
python38-naya-1.1.1-1.1.el8pc.noarch.rpm
python38-pulp-container-2.9.9-1.el8pc.noarch.rpm
python38-pulpcore-3.16.15-1.el8pc.noarch.rpm
rubygem-foreman_maintain-1.0.19-1.el8sat.noarch.rpm
rubygem-smart_proxy_container_gateway-1.0.7-1.el8sat.noarch.rpm
satellite-capsule-6.11.5-1.el8sat.noarch.rpm
satellite-common-6.11.5-1.el8sat.noarch.rpm

Red Hat Satellite 6.11 for RHEL 8:

Source:
rubygem-foreman_maintain-1.0.19-1.el8sat.src.rpm
satellite-clone-3.1.1-2.el8sat.src.rpm

noarch:
rubygem-foreman_maintain-1.0.19-1.el8sat.noarch.rpm
satellite-clone-3.1.1-2.el8sat.noarch.rpm

Red Hat Satellite 6.11 for RHEL 8:

Source:
foreman-3.1.1.26-1.el8sat.src.rpm
satellite-6.11.5-1.el8sat.src.rpm

noarch:
foreman-cli-3.1.1.26-1.el8sat.noarch.rpm
satellite-cli-6.11.5-1.el8sat.noarch.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

  1. References:

https://access.redhat.com/security/cve/CVE-2022-32224
https://access.redhat.com/security/updates/classification/#critical

  1. Contact:

The Red Hat security contact is [email protected]. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2023 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIVAwUBZAiXO9zjgjWX9erEAQgLAQ/+Kn2RsaVk+79nqBuqFtskH6Rxw0hwBANE
nwDxFYLrtBwY8lgFiuDZDFHXuxjg8/9iQntr+s/P5FLC/4t2Gt+VE+RT4IZ4gjFN
O+IMkUCINWW0mfS+IHDvoHe8KOkRFWqGGhcleywOitYnnEGdpFthiCFGfT4oiksE
b0Arv/AiZp6WWuZtXPXOq86HDaepWfx4wvJhW43/6fF+YEz+nXkmtnenxEDaYy53
JGJL3Okuy06FaacvBzhU3Spg/F/lQvN3GVUHQTz/Umh/T7p9YDSa972TnDyWAoMT
591v5DemmWdpxOd44OXr3GxFpUgf2bKsSYMoqssUKgIP07U+Hp2PcpEO79LrR9n0
wXlD5Iea93gSfMHBFylWtcDGTeC2bKNp0AX8MeJ9rVixeUZ4ORFZ6AE/Og3scpNq
4gW+oQMsuMqJfIkc5Xsn5gHG9rxNV4kHam/E+yfgVa7WHklQHkUSKWoK98sIgW4K
OZwOJ29GmpoDEZ+PRX0ksJY1WSX7BaiVtv+VVLYMBcypSEdZrEB3qrz5qIAnn1CO
naXMaOlDAbBdRI7WcCnf0enpaBjhUpfVh98l853x42XD0jntmfYL91u4Klrisxnv
771mt74xJeenPTBDCnisoQ9lQhPH5fS4EgsfeMHuvx5QN+VQNSXQyYKzFrGNCUPm
wNSho9tC/o8=QZVe
-----END PGP SIGNATURE-----

RHSA-announce mailing list
[email protected]
https://listman.redhat.com/mailman/listinfo/rhsa-announce

Related news

Gentoo Linux Security Advisory 202408-24

Gentoo Linux Security Advisory 202408-24 - A vulnerability has been discovered in Ruby on Rails, which can lead to remote code execution via serialization of data. Versions greater than or equal to 6.1.6.1:6.1 are affected.

Red Hat Security Advisory 2023-2097-03

Red Hat Security Advisory 2023-2097-03 - Red Hat Satellite is a systems management tool for Linux-based infrastructure. It allows for provisioning, remote management, and monitoring of multiple Linux deployments with a single centralized tool. Issues addressed include code execution, cross site scripting, denial of service, deserialization, improper neutralization, information leakage, and remote shell upload vulnerabilities.

RHSA-2023:1151: Red Hat Security Advisory: Satellite 6.11.5 Async Security Update

Updated Satellite 6.11 packages that fixes critical security bugs and several regular bugs are now available for Red Hat Satellite.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-32224: An insecure deserialization flaw was found in Active Record, which uses YAML.unsafe_load to convert the YAML data into Ruby objects. An attacker supplying crafted data to the database can perform remote code execution (RCE), resulting in complete system compromise.

Red Hat Security Advisory 2023-0261-02

Red Hat Security Advisory 2023-0261-02 - Red Hat Satellite is a system management solution that allows organizations to configure and maintain their systems without the necessity to provide public Internet access to their servers or other client systems. It performs provisioning and configuration management of predefined standard operating environments.

RHSA-2023:0261: Red Hat Security Advisory: Satellite 6.12.1 Async Security Update

Updated Satellite 6.12 packages that fixes critical security bugs and several regular bugs are now available for Red Hat Satellite.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-32224: activerecord: Possible RCE escalation bug with Serialized Columns in Active Record * CVE-2022-42889: apache-commons-text: variable interpolation RCE

CVE-2022-32224: [CVE-2022-32224] Possible RCE escalation bug with Serialized Columns in Active Record

A possible escalation to RCE vulnerability exists when using YAML serialized columns in Active Record < 7.0.3.1, <6.1.6.1, <6.0.5.1 and <5.2.8.1 which could allow an attacker, that can manipulate data in the database (via means like SQL injection), the ability to escalate to an RCE.

CVE-2022-36006: Arvados 2.4.2 Release Notes

Arvados is an open source platform for managing, processing, and sharing genomic and other large scientific and biomedical data. A remote code execution (RCE) vulnerability in the Arvados Workbench allows authenticated attackers to execute arbitrary code via specially crafted JSON payloads. This exists in all versions up to 2.4.1 and is fixed in 2.4.2. This vulnerability is specific to the Ruby on Rails Workbench application (“Workbench 1”). We do not believe any other Arvados components, including the TypesScript browser-based Workbench application (“Workbench 2”) or API Server, are vulnerable to this attack. For versions of Arvados earlier than 2.4.2: remove the Ruby-based "Workbench 1" app ("apt-get remove arvados-workbench") from your installation as a workaround.

GHSA-3hhc-qp5v-9p2j: RCE bug with Serialized Columns in Active Record

When serialized columns that use YAML (the default) are deserialized, Rails uses YAML.unsafe_load to convert the YAML data in to Ruby objects. If an attacker can manipulate data in the database (via means like SQL injection), then it may be possible for the attacker to escalate to an RCE. There are no feasible workarounds for this issue, but other coders (such as JSON) are not impacted.

Packet Storm: Latest News

Acronis Cyber Protect/Backup Remote Code Execution