An update is now available for Red Hat Satellite 6.15 for RHEL 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Red Hat Satellite is a system management solution that allows organizations to configure and maintain their systems without the necessity to provide public Internet access to their servers or other client systems. It performs provisioning and configuration management of predefined standard operating environments.
Security Fix(es):
* cjson: segmentation violation in function cJSON_InsertItemInArray (CVE-2023-50471)
* cjson: segmentation violation in function cJSON_SetValuestring (CVE-2023-50472)
* cjson: segmentation violation trigger through the second parameter of function cJSON_SetValuestring at cJSON.c (CVE-2024-31755)
* rubygem-rack: Unbounded-Parameter DoS in Rack::QueryParser (CVE-2025-46727)
* python-sqlparse: sqlparse: parsing heavily nested list leads to denial of service (CVE-2024-4340)
Users of Red Hat Satellite are advised to upgrade to these updated packages, which fix these bugs.
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
CVE-2023-50471: NULL Pointer Dereference (CWE-476) CVE-2023-50472: NULL Pointer Dereference (CWE-476) CVE-2024-4340: Uncontrolled Recursion (CWE-674) CVE-2024-31755: Improper Check for Unusual or Exceptional Conditions (CWE-754) CVE-2025-46727: Allocation of Resources Without Limits or Throttling (CWE-770)
Pro-Linux
Funktion steht nur registrierten Nutzern zur Verfügung!
Neue Nachrichten
Funktion steht nur registrierten Nutzern zur Verfügung!