-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Moderate: Satellite 6.10.2 Async Bug Fix Update
Advisory ID:       RHSA-2022:0190-01
Product:           Red Hat Satellite 6
Advisory URL:      https://access.redhat.com/errata/RHSA-2022:0190
Issue date:        2022-01-19
CVE Names:         CVE-2021-21290 
=====================================================================

1. Summary:

Updated Satellite 6.10 packages that fix several bugs are now available for
Red Hat Satellite.

2. Relevant releases/architectures:

Red Hat Satellite 6.10 - noarch, x86_64
Red Hat Satellite Capsule 6.10 - noarch, x86_64

3. Description:

Red Hat Satellite is a system management solution that allows organizations
to configure and maintain their systems without the necessity to provide
public Internet access to their servers or other client systems. It
performs provisioning and configuration management of predefined standard
operating environments.

Security Fix(es):

1927028 - candlepin: netty: Information disclosure via the local system
temporary directory (CVE-2021-21290)

This update fixes the following bugs:

2016047 - Uploading a duplicate file fails with undefined local variable or
method upload_href for
#
2027347 - Satellite 6.10 upgrade fails with PG::NotNullViolation: ERROR:
column "subscription_id" contains null values
2027354 - Using Satellite with a proxy produces an SELinux alert
2027358 - Large CRL file operation causes OOM error in Candlepin
2027817 - [BUG] Upgrading Satellite 6.9 with custom certificates to
Satellite 6.10 beta will cause the same problem to occur as BZ# 1961886
2030445 - Failed at scanning for repository: undefined method
`resolve_substitutions' for nil:NilClass
2030448 - Capsule sync task failed to refresh repo that doesn't have feed
url with "bad argument (expected URI object or URI string)" error

Users of Red Hat Satellite are advised to upgrade to these updated
packages, which fix these bugs.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For detailed instructions how to apply this update, refer to:

https://access.redhat.com/documentation/en-us/red_hat_satellite/6.10/html/upgrading_and_updating_red_hat_satellite/updating_satellite_server_capsule_server_and_content_hosts

5. Bugs fixed (https://bugzilla.redhat.com/):

1927028 - CVE-2021-21290 netty: Information disclosure via the local system temporary directory
2016047 - uploading a duplicate file fails with undefined local variable or method upload_href for #
2027347 - Satellite 6.10 upgrade fails with PG::NotNullViolation: ERROR:  column "subscription_id" contains null values
2027354 - Using Satellite with a proxy produces an SELinux alert
2027358 - Large CRL file operation causes OOM error in Candlepin
2027817 - [BUG] Upgrading Satellite 6.9 with custom certificates to Satellite 6.10 beta will cause the same problem to occur as BZ# 1961886
2030445 - Failed at scanning for repository: undefined method `resolve_substitutions' for nil:NilClass
2030448 - Capsule sync task failed to refresh repo that doesn't have feed url with "bad argument (expected URI object or URI string)" error

6. Package List:

Red Hat Satellite Capsule 6.10:

Source:
pulpcore-selinux-1.2.7-1.el7pc.src.rpm
satellite-6.10.2-1.el7sat.src.rpm

noarch:
satellite-capsule-6.10.2-1.el7sat.noarch.rpm
satellite-common-6.10.2-1.el7sat.noarch.rpm

x86_64:
pulpcore-selinux-1.2.7-1.el7pc.x86_64.rpm

Red Hat Satellite 6.10:

Source:
pulpcore-selinux-1.2.7-1.el7pc.src.rpm
satellite-6.10.2-1.el7sat.src.rpm
tfm-rubygem-katello-4.1.1.42-1.el7sat.src.rpm

noarch:
satellite-6.10.2-1.el7sat.noarch.rpm
satellite-cli-6.10.2-1.el7sat.noarch.rpm
satellite-common-6.10.2-1.el7sat.noarch.rpm
tfm-rubygem-katello-4.1.1.42-1.el7sat.noarch.rpm

x86_64:
pulpcore-selinux-1.2.7-1.el7pc.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2021-21290
https://access.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2022 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=w+yj
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
[email protected]
https://listman.redhat.com/mailman/listinfo/rhsa-announce