Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Satellite
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Satellite
ID: RHSA-2025:9838
Distribution: Red Hat
Plattformen: Red Hat Satellite 6.15 for RHEL 8
Datum: Do, 26. Juni 2025, 22:25
Referenzen: https://access.redhat.com/security/cve/CVE-2024-31755
https://access.redhat.com/security/cve/CVE-2023-50472
https://access.redhat.com/errata/RHSA-2025:9838
https://bugzilla.redhat.com/show_bug.cgi?id=2277268
https://access.redhat.com/security/cve/CVE-2023-50471
https://bugzilla.redhat.com/show_bug.cgi?id=2254643
https://bugzilla.redhat.com/show_bug.cgi?id=2254641
https://access.redhat.com/security/cve/CVE-2025-46727
https://access.redhat.com/documentation/en-us/red_hat_satellite/6.15/html/updating_red_hat_satellite/index
https://bugzilla.redhat.com/show_bug.cgi?id=2364966
https://access.redhat.com/security/cve/CVE-2024-4340
https://bugzilla.redhat.com/show_bug.cgi?id=2278038
Applikationen: Satellite

Originalnachricht

An update  is now available for Red Hat Satellite 6.15 for RHEL 8.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

Red Hat Satellite is a system management solution that allows organizations
to configure and maintain their systems without the necessity to provide
public Internet access to their servers or other client systems. It
performs provisioning and configuration management of predefined standard
operating environments.

Security Fix(es):

* cjson: segmentation violation in function cJSON_InsertItemInArray
(CVE-2023-50471)

* cjson: segmentation violation in function cJSON_SetValuestring
(CVE-2023-50472)

* cjson: segmentation violation trigger through the second parameter of
function cJSON_SetValuestring at cJSON.c (CVE-2024-31755)

* rubygem-rack: Unbounded-Parameter DoS in Rack::QueryParser (CVE-2025-46727)

* python-sqlparse: sqlparse: parsing heavily nested list leads to denial of
service (CVE-2024-4340)

Users of Red Hat Satellite are advised to upgrade to these updated
packages, which fix these bugs.

This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

CVE-2023-50471: NULL Pointer Dereference (CWE-476)
CVE-2023-50472: NULL Pointer Dereference (CWE-476)
CVE-2024-4340: Uncontrolled Recursion (CWE-674)
CVE-2024-31755: Improper Check for Unusual or Exceptional Conditions (CWE-754)
CVE-2025-46727: Allocation of Resources Without Limits or Throttling (CWE-770)
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung