RHEL 8 : Satellite 6.12.3 Async Security Update (Important) (RHSA-2023:1630)

medium Nessus Plugin ID 194288

Synopsis

The remote Red Hat host is missing a security update.

Description

The remote Redhat Enterprise Linux 8 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2023:1630 advisory.

Red Hat Satellite is a system management solution that allows organizations to configure and maintain their systems without the necessity to provide public Internet access to their servers or other client systems. It performs provisioning and configuration management of predefined standard operating environments.

Security fix(es):

* Candlepin: PreparedStatement.setText(int, InputStream) will create a temporary file if the InputStream is larger than 2k (CVE-2022-41946)

This update fixes the following bugs:

2163538 - Pages Blank 2174984 - Getting 'null value in column \image_manifest_id\ violates not-null constraint' when syncing openstack container repos 2174987 - (Regression of 2033940) Error: AttributeError: 'NoneType' object has no attribute 'cast' thrown while listing repository versions 2174994 - VMware Image based Provisioning fails with error- : Could not find virtual machine network interface matching <IP> 2174997 - Package and Errata actions on content hosts selected using the select all hosts option fails.
2174998 - Subscription can't be blank, A Pool and its Subscription cannot belong to different organizations 2175002 - Getting undefined method `schema_version' for nil:NilClass while syncing from quay.io 2175005 - New kickstart_kernel_options snippet breaks UEFI (Grub2) PXE provisioning when boot_mode is static 2175008 - RHEL 9 as Guest OS is not available on Satellite 6.11 2174995 - Health check should use hostname -f 2175007 - [regression] data.yml is referring to old sync plain id which does not exist in katello_sync_plans 2176272 - new wait task introduced by rh_cloud 6.0.44 is not recognized by maintain as OK to interrupt 2175010 - Some custom repositories are failing to synchorize with error This field may not be blank after upgrading to Red Hat Satellite 6.11 2176922 - [RFE] Need syncable yum-format repository imports 2175003 - Can't perform incremental content exports in syncable format

Users of Red Hat Satellite are advised to upgrade to these updated packages, which fix these bugs.

Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Update the affected candlepin and / or candlepin-selinux packages.

See Also

https://access.redhat.com/security/updates/classification/#important

https://bugzilla.redhat.com/show_bug.cgi?id=2153399

https://bugzilla.redhat.com/show_bug.cgi?id=2163538

https://bugzilla.redhat.com/show_bug.cgi?id=2174984

https://bugzilla.redhat.com/show_bug.cgi?id=2174987

https://bugzilla.redhat.com/show_bug.cgi?id=2174994

https://bugzilla.redhat.com/show_bug.cgi?id=2174995

https://bugzilla.redhat.com/show_bug.cgi?id=2174997

https://bugzilla.redhat.com/show_bug.cgi?id=2174998

https://bugzilla.redhat.com/show_bug.cgi?id=2175002

https://bugzilla.redhat.com/show_bug.cgi?id=2175003

https://bugzilla.redhat.com/show_bug.cgi?id=2175005

https://bugzilla.redhat.com/show_bug.cgi?id=2175007

https://bugzilla.redhat.com/show_bug.cgi?id=2175008

https://bugzilla.redhat.com/show_bug.cgi?id=2175010

https://bugzilla.redhat.com/show_bug.cgi?id=2176272

https://bugzilla.redhat.com/show_bug.cgi?id=2176922

http://www.nessus.org/u?8cab80ad

https://access.redhat.com/errata/RHSA-2023:1630

Plugin Details

Severity: Medium

ID: 194288

File Name: redhat-RHSA-2023-1630.nasl

Version: 1.2

Type: local

Agent: unix

Published: 4/28/2024

Updated: 11/7/2024

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

Vendor

Vendor Severity: Important

CVSS v2

Risk Factor: Medium

Base Score: 4.6

Temporal Score: 3.6

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:N/A:N

CVSS Score Source: CVE-2022-41946

CVSS v3

Risk Factor: Medium

Base Score: 5.5

Temporal Score: 5

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:candlepin-selinux, p-cpe:/a:redhat:enterprise_linux:candlepin, cpe:/o:redhat:enterprise_linux:8

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 4/4/2023

Vulnerability Publication Date: 11/23/2022

Reference Information

CVE: CVE-2022-41946

CWE: 377

RHSA: 2023:1630