rhsa-2024_2011
Vulnerability from csaf_redhat
Published
2024-04-23 17:29
Modified
2024-11-06 05:35
Summary
Red Hat Security Advisory: Satellite Client Async Security Update
Notes
Topic
Updated Satellite Client packages that fixes Important security bugs and regular bugs are now available for Red Hat Satellite.
Details
Red Hat Satellite is a system management solution that allows organizations
to configure and maintain their systems without the necessity to provide
public Internet access to their servers or other client systems. It
performs provisioning and configuration management of predefined standard
operating environments.
Security fix:
* puppet-agent: curl heap based buffer overflow in the SOCKS5 proxy handshake (CVE-2023-38545)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated Satellite Client packages that fixes Important security bugs and regular bugs are now available for Red Hat Satellite.", "title": "Topic" }, { "category": "general", "text": "Red Hat Satellite is a system management solution that allows organizations\nto configure and maintain their systems without the necessity to provide\npublic Internet access to their servers or other client systems. It\nperforms provisioning and configuration management of predefined standard\noperating environments.\n\nSecurity fix:\n* puppet-agent: curl heap based buffer overflow in the SOCKS5 proxy handshake (CVE-2023-38545)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:2011", "url": "https://access.redhat.com/errata/RHSA-2024:2011" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1992229", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992229" }, { "category": "external", "summary": "2241933", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241933" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2011.json" } ], "title": "Red Hat Security Advisory: Satellite Client Async Security Update", "tracking": { "current_release_date": "2024-11-06T05:35:18+00:00", "generator": { "date": "2024-11-06T05:35:18+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2024:2011", "initial_release_date": "2024-04-23T17:29:39+00:00", "revision_history": [ { "date": "2024-04-23T17:29:39+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-04-23T17:29:39+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-06T05:35:18+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Satellite Client 6 for RHEL 6", "product": { "name": "Satellite Client 6 for RHEL 6", "product_id": "6Server-satellite-client-6", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_satellite_client:6::el6" } } }, { "category": "product_name", "name": "Satellite Client 6 for RHEL 7", "product": { "name": "Satellite Client 6 for RHEL 7", "product_id": "7Server-satellite-client-6", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_satellite_client:6::el7" } } }, { "category": "product_name", "name": "Satellite Client 6 for RHEL 7", "product": { "name": "Satellite Client 6 for RHEL 7", "product_id": "7Client-satellite-client-6", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_satellite_client:6::el7" } } }, { "category": "product_name", "name": "Satellite Client 6 for RHEL 7", "product": { "name": "Satellite Client 6 for RHEL 7", "product_id": "7ComputeNode-satellite-client-6", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_satellite_client:6::el7" } } }, { "category": "product_name", "name": "Satellite Client 6 for RHEL 7", "product": { "name": "Satellite Client 6 for RHEL 7", "product_id": "7Workstation-satellite-client-6", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_satellite_client:6::el7" } } }, { "category": "product_name", "name": "Satellite Client 6 for RHEL 8", "product": { "name": "Satellite Client 6 for RHEL 8", "product_id": "8Base-satellite-client-6", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_satellite_client:6::el8" } } }, { "category": "product_name", "name": "Satellite Client 6 for RHEL 9", "product": { "name": "Satellite Client 6 for RHEL 9", "product_id": "9Base-satellite-client-6", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_satellite_client:6::el9" } } } ], "category": "product_family", "name": "Red Hat Satellite Client" }, { "branches": [ { "category": "product_version", "name": "puppet-agent-0:7.27.0-1.el6sat.src", "product": { "name": "puppet-agent-0:7.27.0-1.el6sat.src", "product_id": "puppet-agent-0:7.27.0-1.el6sat.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/puppet-agent@7.27.0-1.el6sat?arch=src" } } }, { "category": "product_version", "name": "rubygem-foreman_scap_client-0:0.5.2-1.el6sat.src", "product": { "name": "rubygem-foreman_scap_client-0:0.5.2-1.el6sat.src", "product_id": "rubygem-foreman_scap_client-0:0.5.2-1.el6sat.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-foreman_scap_client@0.5.2-1.el6sat?arch=src" } } }, { "category": "product_version", "name": "puppet-agent-0:7.27.0-1.el7sat.src", "product": { "name": "puppet-agent-0:7.27.0-1.el7sat.src", "product_id": "puppet-agent-0:7.27.0-1.el7sat.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/puppet-agent@7.27.0-1.el7sat?arch=src" } } }, { "category": "product_version", "name": "rubygem-foreman_scap_client-0:0.5.2-1.el7sat.src", "product": { "name": "rubygem-foreman_scap_client-0:0.5.2-1.el7sat.src", "product_id": "rubygem-foreman_scap_client-0:0.5.2-1.el7sat.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-foreman_scap_client@0.5.2-1.el7sat?arch=src" } } }, { "category": "product_version", "name": "puppet-agent-0:7.27.0-1.el8sat.src", "product": { "name": "puppet-agent-0:7.27.0-1.el8sat.src", "product_id": "puppet-agent-0:7.27.0-1.el8sat.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/puppet-agent@7.27.0-1.el8sat?arch=src" } } }, { "category": "product_version", "name": "rubygem-foreman_scap_client-0:0.5.2-1.el8sat.src", "product": { "name": "rubygem-foreman_scap_client-0:0.5.2-1.el8sat.src", "product_id": "rubygem-foreman_scap_client-0:0.5.2-1.el8sat.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-foreman_scap_client@0.5.2-1.el8sat?arch=src" } } }, { "category": "product_version", "name": "puppet-agent-0:7.27.0-1.el9sat.src", "product": { "name": "puppet-agent-0:7.27.0-1.el9sat.src", "product_id": "puppet-agent-0:7.27.0-1.el9sat.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/puppet-agent@7.27.0-1.el9sat?arch=src" } } }, { "category": "product_version", "name": "rubygem-foreman_scap_client-0:0.5.2-1.el9sat.src", "product": { "name": "rubygem-foreman_scap_client-0:0.5.2-1.el9sat.src", "product_id": "rubygem-foreman_scap_client-0:0.5.2-1.el9sat.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-foreman_scap_client@0.5.2-1.el9sat?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "puppet-agent-0:7.27.0-1.el6sat.x86_64", "product": { "name": "puppet-agent-0:7.27.0-1.el6sat.x86_64", "product_id": "puppet-agent-0:7.27.0-1.el6sat.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/puppet-agent@7.27.0-1.el6sat?arch=x86_64" } } }, { "category": "product_version", "name": "puppet-agent-0:7.27.0-1.el7sat.x86_64", "product": { "name": "puppet-agent-0:7.27.0-1.el7sat.x86_64", "product_id": "puppet-agent-0:7.27.0-1.el7sat.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/puppet-agent@7.27.0-1.el7sat?arch=x86_64" } } }, { "category": "product_version", "name": "puppet-agent-0:7.27.0-1.el8sat.x86_64", "product": { "name": "puppet-agent-0:7.27.0-1.el8sat.x86_64", "product_id": "puppet-agent-0:7.27.0-1.el8sat.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/puppet-agent@7.27.0-1.el8sat?arch=x86_64" } } }, { "category": "product_version", "name": "puppet-agent-0:7.27.0-1.el9sat.x86_64", "product": { "name": "puppet-agent-0:7.27.0-1.el9sat.x86_64", "product_id": "puppet-agent-0:7.27.0-1.el9sat.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/puppet-agent@7.27.0-1.el9sat?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "puppet-agent-0:7.27.0-1.el6sat.i686", "product": { "name": "puppet-agent-0:7.27.0-1.el6sat.i686", "product_id": "puppet-agent-0:7.27.0-1.el6sat.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/puppet-agent@7.27.0-1.el6sat?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "rubygem-foreman_scap_client-0:0.5.2-1.el6sat.noarch", "product": { "name": "rubygem-foreman_scap_client-0:0.5.2-1.el6sat.noarch", "product_id": "rubygem-foreman_scap_client-0:0.5.2-1.el6sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-foreman_scap_client@0.5.2-1.el6sat?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-foreman_scap_client-0:0.5.2-1.el7sat.noarch", "product": { "name": "rubygem-foreman_scap_client-0:0.5.2-1.el7sat.noarch", "product_id": "rubygem-foreman_scap_client-0:0.5.2-1.el7sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-foreman_scap_client@0.5.2-1.el7sat?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-foreman_scap_client-0:0.5.2-1.el8sat.noarch", "product": { "name": "rubygem-foreman_scap_client-0:0.5.2-1.el8sat.noarch", "product_id": "rubygem-foreman_scap_client-0:0.5.2-1.el8sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-foreman_scap_client@0.5.2-1.el8sat?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-foreman_scap_client-0:0.5.2-1.el9sat.noarch", "product": { "name": "rubygem-foreman_scap_client-0:0.5.2-1.el9sat.noarch", "product_id": "rubygem-foreman_scap_client-0:0.5.2-1.el9sat.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-foreman_scap_client@0.5.2-1.el9sat?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "puppet-agent-0:7.27.0-1.el6sat.i686 as a component of Satellite Client 6 for RHEL 6", "product_id": "6Server-satellite-client-6:puppet-agent-0:7.27.0-1.el6sat.i686" }, "product_reference": "puppet-agent-0:7.27.0-1.el6sat.i686", "relates_to_product_reference": "6Server-satellite-client-6" }, { "category": "default_component_of", "full_product_name": { "name": "puppet-agent-0:7.27.0-1.el6sat.src as a component of Satellite Client 6 for RHEL 6", "product_id": "6Server-satellite-client-6:puppet-agent-0:7.27.0-1.el6sat.src" }, "product_reference": "puppet-agent-0:7.27.0-1.el6sat.src", "relates_to_product_reference": "6Server-satellite-client-6" }, { "category": "default_component_of", "full_product_name": { "name": "puppet-agent-0:7.27.0-1.el6sat.x86_64 as a component of Satellite Client 6 for RHEL 6", "product_id": "6Server-satellite-client-6:puppet-agent-0:7.27.0-1.el6sat.x86_64" }, "product_reference": "puppet-agent-0:7.27.0-1.el6sat.x86_64", "relates_to_product_reference": "6Server-satellite-client-6" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-foreman_scap_client-0:0.5.2-1.el6sat.noarch as a component of Satellite Client 6 for RHEL 6", "product_id": "6Server-satellite-client-6:rubygem-foreman_scap_client-0:0.5.2-1.el6sat.noarch" }, "product_reference": "rubygem-foreman_scap_client-0:0.5.2-1.el6sat.noarch", "relates_to_product_reference": "6Server-satellite-client-6" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-foreman_scap_client-0:0.5.2-1.el6sat.src as a component of Satellite Client 6 for RHEL 6", "product_id": "6Server-satellite-client-6:rubygem-foreman_scap_client-0:0.5.2-1.el6sat.src" }, "product_reference": "rubygem-foreman_scap_client-0:0.5.2-1.el6sat.src", "relates_to_product_reference": "6Server-satellite-client-6" }, { "category": "default_component_of", "full_product_name": { "name": "puppet-agent-0:7.27.0-1.el7sat.src as a component of Satellite Client 6 for RHEL 7", "product_id": "7Client-satellite-client-6:puppet-agent-0:7.27.0-1.el7sat.src" }, "product_reference": "puppet-agent-0:7.27.0-1.el7sat.src", "relates_to_product_reference": "7Client-satellite-client-6" }, { "category": "default_component_of", "full_product_name": { "name": "puppet-agent-0:7.27.0-1.el7sat.x86_64 as a component of Satellite Client 6 for RHEL 7", "product_id": "7Client-satellite-client-6:puppet-agent-0:7.27.0-1.el7sat.x86_64" }, "product_reference": "puppet-agent-0:7.27.0-1.el7sat.x86_64", "relates_to_product_reference": "7Client-satellite-client-6" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-foreman_scap_client-0:0.5.2-1.el7sat.noarch as a component of Satellite Client 6 for RHEL 7", "product_id": "7Client-satellite-client-6:rubygem-foreman_scap_client-0:0.5.2-1.el7sat.noarch" }, "product_reference": "rubygem-foreman_scap_client-0:0.5.2-1.el7sat.noarch", "relates_to_product_reference": "7Client-satellite-client-6" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-foreman_scap_client-0:0.5.2-1.el7sat.src as a component of Satellite Client 6 for RHEL 7", "product_id": "7Client-satellite-client-6:rubygem-foreman_scap_client-0:0.5.2-1.el7sat.src" }, "product_reference": "rubygem-foreman_scap_client-0:0.5.2-1.el7sat.src", "relates_to_product_reference": "7Client-satellite-client-6" }, { "category": "default_component_of", "full_product_name": { "name": "puppet-agent-0:7.27.0-1.el7sat.src as a component of Satellite Client 6 for RHEL 7", "product_id": "7ComputeNode-satellite-client-6:puppet-agent-0:7.27.0-1.el7sat.src" }, "product_reference": "puppet-agent-0:7.27.0-1.el7sat.src", "relates_to_product_reference": "7ComputeNode-satellite-client-6" }, { "category": "default_component_of", "full_product_name": { "name": "puppet-agent-0:7.27.0-1.el7sat.x86_64 as a component of Satellite Client 6 for RHEL 7", "product_id": "7ComputeNode-satellite-client-6:puppet-agent-0:7.27.0-1.el7sat.x86_64" }, "product_reference": "puppet-agent-0:7.27.0-1.el7sat.x86_64", "relates_to_product_reference": "7ComputeNode-satellite-client-6" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-foreman_scap_client-0:0.5.2-1.el7sat.noarch as a component of Satellite Client 6 for RHEL 7", "product_id": "7ComputeNode-satellite-client-6:rubygem-foreman_scap_client-0:0.5.2-1.el7sat.noarch" }, "product_reference": "rubygem-foreman_scap_client-0:0.5.2-1.el7sat.noarch", "relates_to_product_reference": "7ComputeNode-satellite-client-6" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-foreman_scap_client-0:0.5.2-1.el7sat.src as a component of Satellite Client 6 for RHEL 7", "product_id": "7ComputeNode-satellite-client-6:rubygem-foreman_scap_client-0:0.5.2-1.el7sat.src" }, "product_reference": "rubygem-foreman_scap_client-0:0.5.2-1.el7sat.src", "relates_to_product_reference": "7ComputeNode-satellite-client-6" }, { "category": "default_component_of", "full_product_name": { "name": "puppet-agent-0:7.27.0-1.el7sat.src as a component of Satellite Client 6 for RHEL 7", "product_id": "7Server-satellite-client-6:puppet-agent-0:7.27.0-1.el7sat.src" }, "product_reference": "puppet-agent-0:7.27.0-1.el7sat.src", "relates_to_product_reference": "7Server-satellite-client-6" }, { "category": "default_component_of", "full_product_name": { "name": "puppet-agent-0:7.27.0-1.el7sat.x86_64 as a component of Satellite Client 6 for RHEL 7", "product_id": "7Server-satellite-client-6:puppet-agent-0:7.27.0-1.el7sat.x86_64" }, "product_reference": "puppet-agent-0:7.27.0-1.el7sat.x86_64", "relates_to_product_reference": "7Server-satellite-client-6" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-foreman_scap_client-0:0.5.2-1.el7sat.noarch as a component of Satellite Client 6 for RHEL 7", "product_id": "7Server-satellite-client-6:rubygem-foreman_scap_client-0:0.5.2-1.el7sat.noarch" }, "product_reference": "rubygem-foreman_scap_client-0:0.5.2-1.el7sat.noarch", "relates_to_product_reference": "7Server-satellite-client-6" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-foreman_scap_client-0:0.5.2-1.el7sat.src as a component of Satellite Client 6 for RHEL 7", "product_id": "7Server-satellite-client-6:rubygem-foreman_scap_client-0:0.5.2-1.el7sat.src" }, "product_reference": "rubygem-foreman_scap_client-0:0.5.2-1.el7sat.src", "relates_to_product_reference": "7Server-satellite-client-6" }, { "category": "default_component_of", "full_product_name": { "name": "puppet-agent-0:7.27.0-1.el7sat.src as a component of Satellite Client 6 for RHEL 7", "product_id": "7Workstation-satellite-client-6:puppet-agent-0:7.27.0-1.el7sat.src" }, "product_reference": "puppet-agent-0:7.27.0-1.el7sat.src", "relates_to_product_reference": "7Workstation-satellite-client-6" }, { "category": "default_component_of", "full_product_name": { "name": "puppet-agent-0:7.27.0-1.el7sat.x86_64 as a component of Satellite Client 6 for RHEL 7", "product_id": "7Workstation-satellite-client-6:puppet-agent-0:7.27.0-1.el7sat.x86_64" }, "product_reference": "puppet-agent-0:7.27.0-1.el7sat.x86_64", "relates_to_product_reference": "7Workstation-satellite-client-6" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-foreman_scap_client-0:0.5.2-1.el7sat.noarch as a component of Satellite Client 6 for RHEL 7", "product_id": "7Workstation-satellite-client-6:rubygem-foreman_scap_client-0:0.5.2-1.el7sat.noarch" }, "product_reference": "rubygem-foreman_scap_client-0:0.5.2-1.el7sat.noarch", "relates_to_product_reference": "7Workstation-satellite-client-6" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-foreman_scap_client-0:0.5.2-1.el7sat.src as a component of Satellite Client 6 for RHEL 7", "product_id": "7Workstation-satellite-client-6:rubygem-foreman_scap_client-0:0.5.2-1.el7sat.src" }, "product_reference": "rubygem-foreman_scap_client-0:0.5.2-1.el7sat.src", "relates_to_product_reference": "7Workstation-satellite-client-6" }, { "category": "default_component_of", "full_product_name": { "name": "puppet-agent-0:7.27.0-1.el8sat.src as a component of Satellite Client 6 for RHEL 8", "product_id": "8Base-satellite-client-6:puppet-agent-0:7.27.0-1.el8sat.src" }, "product_reference": "puppet-agent-0:7.27.0-1.el8sat.src", "relates_to_product_reference": "8Base-satellite-client-6" }, { "category": "default_component_of", "full_product_name": { "name": "puppet-agent-0:7.27.0-1.el8sat.x86_64 as a component of Satellite Client 6 for RHEL 8", "product_id": "8Base-satellite-client-6:puppet-agent-0:7.27.0-1.el8sat.x86_64" }, "product_reference": "puppet-agent-0:7.27.0-1.el8sat.x86_64", "relates_to_product_reference": "8Base-satellite-client-6" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-foreman_scap_client-0:0.5.2-1.el8sat.noarch as a component of Satellite Client 6 for RHEL 8", "product_id": "8Base-satellite-client-6:rubygem-foreman_scap_client-0:0.5.2-1.el8sat.noarch" }, "product_reference": "rubygem-foreman_scap_client-0:0.5.2-1.el8sat.noarch", "relates_to_product_reference": "8Base-satellite-client-6" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-foreman_scap_client-0:0.5.2-1.el8sat.src as a component of Satellite Client 6 for RHEL 8", "product_id": "8Base-satellite-client-6:rubygem-foreman_scap_client-0:0.5.2-1.el8sat.src" }, "product_reference": "rubygem-foreman_scap_client-0:0.5.2-1.el8sat.src", "relates_to_product_reference": "8Base-satellite-client-6" }, { "category": "default_component_of", "full_product_name": { "name": "puppet-agent-0:7.27.0-1.el9sat.src as a component of Satellite Client 6 for RHEL 9", "product_id": "9Base-satellite-client-6:puppet-agent-0:7.27.0-1.el9sat.src" }, "product_reference": "puppet-agent-0:7.27.0-1.el9sat.src", "relates_to_product_reference": "9Base-satellite-client-6" }, { "category": "default_component_of", "full_product_name": { "name": "puppet-agent-0:7.27.0-1.el9sat.x86_64 as a component of Satellite Client 6 for RHEL 9", "product_id": "9Base-satellite-client-6:puppet-agent-0:7.27.0-1.el9sat.x86_64" }, "product_reference": "puppet-agent-0:7.27.0-1.el9sat.x86_64", "relates_to_product_reference": "9Base-satellite-client-6" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-foreman_scap_client-0:0.5.2-1.el9sat.noarch as a component of Satellite Client 6 for RHEL 9", "product_id": "9Base-satellite-client-6:rubygem-foreman_scap_client-0:0.5.2-1.el9sat.noarch" }, "product_reference": "rubygem-foreman_scap_client-0:0.5.2-1.el9sat.noarch", "relates_to_product_reference": "9Base-satellite-client-6" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-foreman_scap_client-0:0.5.2-1.el9sat.src as a component of Satellite Client 6 for RHEL 9", "product_id": "9Base-satellite-client-6:rubygem-foreman_scap_client-0:0.5.2-1.el9sat.src" }, "product_reference": "rubygem-foreman_scap_client-0:0.5.2-1.el9sat.src", "relates_to_product_reference": "9Base-satellite-client-6" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Jay Satiro" ] } ], "cve": "CVE-2023-38545", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2023-10-03T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "6Server-satellite-client-6:rubygem-foreman_scap_client-0:0.5.2-1.el6sat.noarch", "6Server-satellite-client-6:rubygem-foreman_scap_client-0:0.5.2-1.el6sat.src", "7Client-satellite-client-6:rubygem-foreman_scap_client-0:0.5.2-1.el7sat.noarch", "7Client-satellite-client-6:rubygem-foreman_scap_client-0:0.5.2-1.el7sat.src", "7ComputeNode-satellite-client-6:rubygem-foreman_scap_client-0:0.5.2-1.el7sat.noarch", "7ComputeNode-satellite-client-6:rubygem-foreman_scap_client-0:0.5.2-1.el7sat.src", "7Server-satellite-client-6:rubygem-foreman_scap_client-0:0.5.2-1.el7sat.noarch", "7Server-satellite-client-6:rubygem-foreman_scap_client-0:0.5.2-1.el7sat.src", "7Workstation-satellite-client-6:rubygem-foreman_scap_client-0:0.5.2-1.el7sat.noarch", "7Workstation-satellite-client-6:rubygem-foreman_scap_client-0:0.5.2-1.el7sat.src", "8Base-satellite-client-6:rubygem-foreman_scap_client-0:0.5.2-1.el8sat.noarch", "8Base-satellite-client-6:rubygem-foreman_scap_client-0:0.5.2-1.el8sat.src", "9Base-satellite-client-6:rubygem-foreman_scap_client-0:0.5.2-1.el9sat.noarch", "9Base-satellite-client-6:rubygem-foreman_scap_client-0:0.5.2-1.el9sat.src" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241933" } ], "notes": [ { "category": "description", "text": "A heap-based buffer overflow flaw was found in the SOCKS5 proxy handshake in the Curl package. If Curl is unable to resolve the address itself, it passes the hostname to the SOCKS5 proxy. However, the maximum length of the hostname that can be passed is 255 bytes. If the hostname is longer, then Curl switches to the local name resolving and passes the resolved address only to the proxy. The local variable that instructs Curl to \"let the host resolve the name\" could obtain the wrong value during a slow SOCKS5 handshake, resulting in the too-long hostname being copied to the target buffer instead of the resolved address, which was not the intended behavior.", "title": "Vulnerability description" }, { "category": "summary", "text": "curl: heap based buffer overflow in the SOCKS5 proxy handshake", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw does not affect the versions of curl as shipped with Red Hat Enterprise Linux 6, 7, and 8.\n\nAn overflow is only possible in applications that do not set `CURLOPT_BUFFERSIZE`, or set it smaller than approximately 65kB. Since the curl tool sets `CURLOPT_BUFFERSIZE` to 100kB by default, it is not vulnerable unless rate limiting was set by the user to a size smaller than 65kB.\n\nKnowledgebase article:\n\nhttps://access.redhat.com/solutions/7045099", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-satellite-client-6:puppet-agent-0:7.27.0-1.el6sat.i686", "6Server-satellite-client-6:puppet-agent-0:7.27.0-1.el6sat.src", "6Server-satellite-client-6:puppet-agent-0:7.27.0-1.el6sat.x86_64", "7Client-satellite-client-6:puppet-agent-0:7.27.0-1.el7sat.src", "7Client-satellite-client-6:puppet-agent-0:7.27.0-1.el7sat.x86_64", "7ComputeNode-satellite-client-6:puppet-agent-0:7.27.0-1.el7sat.src", "7ComputeNode-satellite-client-6:puppet-agent-0:7.27.0-1.el7sat.x86_64", "7Server-satellite-client-6:puppet-agent-0:7.27.0-1.el7sat.src", "7Server-satellite-client-6:puppet-agent-0:7.27.0-1.el7sat.x86_64", "7Workstation-satellite-client-6:puppet-agent-0:7.27.0-1.el7sat.src", "7Workstation-satellite-client-6:puppet-agent-0:7.27.0-1.el7sat.x86_64", "8Base-satellite-client-6:puppet-agent-0:7.27.0-1.el8sat.src", "8Base-satellite-client-6:puppet-agent-0:7.27.0-1.el8sat.x86_64", "9Base-satellite-client-6:puppet-agent-0:7.27.0-1.el9sat.src", "9Base-satellite-client-6:puppet-agent-0:7.27.0-1.el9sat.x86_64" ], "known_not_affected": [ "6Server-satellite-client-6:rubygem-foreman_scap_client-0:0.5.2-1.el6sat.noarch", "6Server-satellite-client-6:rubygem-foreman_scap_client-0:0.5.2-1.el6sat.src", "7Client-satellite-client-6:rubygem-foreman_scap_client-0:0.5.2-1.el7sat.noarch", "7Client-satellite-client-6:rubygem-foreman_scap_client-0:0.5.2-1.el7sat.src", "7ComputeNode-satellite-client-6:rubygem-foreman_scap_client-0:0.5.2-1.el7sat.noarch", "7ComputeNode-satellite-client-6:rubygem-foreman_scap_client-0:0.5.2-1.el7sat.src", "7Server-satellite-client-6:rubygem-foreman_scap_client-0:0.5.2-1.el7sat.noarch", "7Server-satellite-client-6:rubygem-foreman_scap_client-0:0.5.2-1.el7sat.src", "7Workstation-satellite-client-6:rubygem-foreman_scap_client-0:0.5.2-1.el7sat.noarch", "7Workstation-satellite-client-6:rubygem-foreman_scap_client-0:0.5.2-1.el7sat.src", "8Base-satellite-client-6:rubygem-foreman_scap_client-0:0.5.2-1.el8sat.noarch", "8Base-satellite-client-6:rubygem-foreman_scap_client-0:0.5.2-1.el8sat.src", "9Base-satellite-client-6:rubygem-foreman_scap_client-0:0.5.2-1.el9sat.noarch", "9Base-satellite-client-6:rubygem-foreman_scap_client-0:0.5.2-1.el9sat.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-38545" }, { "category": "external", "summary": "RHBZ#2241933", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241933" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-38545", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38545" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38545", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38545" }, { "category": "external", "summary": "https://curl.se/docs/CVE-2023-38545.html", "url": "https://curl.se/docs/CVE-2023-38545.html" } ], "release_date": "2023-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-23T17:29:39+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-satellite-client-6:puppet-agent-0:7.27.0-1.el6sat.i686", "6Server-satellite-client-6:puppet-agent-0:7.27.0-1.el6sat.src", "6Server-satellite-client-6:puppet-agent-0:7.27.0-1.el6sat.x86_64", "7Client-satellite-client-6:puppet-agent-0:7.27.0-1.el7sat.src", "7Client-satellite-client-6:puppet-agent-0:7.27.0-1.el7sat.x86_64", "7ComputeNode-satellite-client-6:puppet-agent-0:7.27.0-1.el7sat.src", "7ComputeNode-satellite-client-6:puppet-agent-0:7.27.0-1.el7sat.x86_64", "7Server-satellite-client-6:puppet-agent-0:7.27.0-1.el7sat.src", "7Server-satellite-client-6:puppet-agent-0:7.27.0-1.el7sat.x86_64", "7Workstation-satellite-client-6:puppet-agent-0:7.27.0-1.el7sat.src", "7Workstation-satellite-client-6:puppet-agent-0:7.27.0-1.el7sat.x86_64", "8Base-satellite-client-6:puppet-agent-0:7.27.0-1.el8sat.src", "8Base-satellite-client-6:puppet-agent-0:7.27.0-1.el8sat.x86_64", "9Base-satellite-client-6:puppet-agent-0:7.27.0-1.el9sat.src", "9Base-satellite-client-6:puppet-agent-0:7.27.0-1.el9sat.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2011" }, { "category": "workaround", "details": "To avoid this issue, we recommend you do not use `CURLPROXY_SOCKS5_HOSTNAME` proxies with curl. Also do not set a proxy environment variable to socks5h://", "product_ids": [ "6Server-satellite-client-6:puppet-agent-0:7.27.0-1.el6sat.i686", "6Server-satellite-client-6:puppet-agent-0:7.27.0-1.el6sat.src", "6Server-satellite-client-6:puppet-agent-0:7.27.0-1.el6sat.x86_64", "6Server-satellite-client-6:rubygem-foreman_scap_client-0:0.5.2-1.el6sat.noarch", "6Server-satellite-client-6:rubygem-foreman_scap_client-0:0.5.2-1.el6sat.src", "7Client-satellite-client-6:puppet-agent-0:7.27.0-1.el7sat.src", "7Client-satellite-client-6:puppet-agent-0:7.27.0-1.el7sat.x86_64", "7Client-satellite-client-6:rubygem-foreman_scap_client-0:0.5.2-1.el7sat.noarch", "7Client-satellite-client-6:rubygem-foreman_scap_client-0:0.5.2-1.el7sat.src", "7ComputeNode-satellite-client-6:puppet-agent-0:7.27.0-1.el7sat.src", "7ComputeNode-satellite-client-6:puppet-agent-0:7.27.0-1.el7sat.x86_64", "7ComputeNode-satellite-client-6:rubygem-foreman_scap_client-0:0.5.2-1.el7sat.noarch", "7ComputeNode-satellite-client-6:rubygem-foreman_scap_client-0:0.5.2-1.el7sat.src", "7Server-satellite-client-6:puppet-agent-0:7.27.0-1.el7sat.src", "7Server-satellite-client-6:puppet-agent-0:7.27.0-1.el7sat.x86_64", "7Server-satellite-client-6:rubygem-foreman_scap_client-0:0.5.2-1.el7sat.noarch", "7Server-satellite-client-6:rubygem-foreman_scap_client-0:0.5.2-1.el7sat.src", "7Workstation-satellite-client-6:puppet-agent-0:7.27.0-1.el7sat.src", "7Workstation-satellite-client-6:puppet-agent-0:7.27.0-1.el7sat.x86_64", "7Workstation-satellite-client-6:rubygem-foreman_scap_client-0:0.5.2-1.el7sat.noarch", "7Workstation-satellite-client-6:rubygem-foreman_scap_client-0:0.5.2-1.el7sat.src", "8Base-satellite-client-6:puppet-agent-0:7.27.0-1.el8sat.src", "8Base-satellite-client-6:puppet-agent-0:7.27.0-1.el8sat.x86_64", "8Base-satellite-client-6:rubygem-foreman_scap_client-0:0.5.2-1.el8sat.noarch", "8Base-satellite-client-6:rubygem-foreman_scap_client-0:0.5.2-1.el8sat.src", "9Base-satellite-client-6:puppet-agent-0:7.27.0-1.el9sat.src", "9Base-satellite-client-6:puppet-agent-0:7.27.0-1.el9sat.x86_64", "9Base-satellite-client-6:rubygem-foreman_scap_client-0:0.5.2-1.el9sat.noarch", "9Base-satellite-client-6:rubygem-foreman_scap_client-0:0.5.2-1.el9sat.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "6Server-satellite-client-6:puppet-agent-0:7.27.0-1.el6sat.i686", "6Server-satellite-client-6:puppet-agent-0:7.27.0-1.el6sat.src", "6Server-satellite-client-6:puppet-agent-0:7.27.0-1.el6sat.x86_64", "7Client-satellite-client-6:puppet-agent-0:7.27.0-1.el7sat.src", "7Client-satellite-client-6:puppet-agent-0:7.27.0-1.el7sat.x86_64", "7ComputeNode-satellite-client-6:puppet-agent-0:7.27.0-1.el7sat.src", "7ComputeNode-satellite-client-6:puppet-agent-0:7.27.0-1.el7sat.x86_64", "7Server-satellite-client-6:puppet-agent-0:7.27.0-1.el7sat.src", "7Server-satellite-client-6:puppet-agent-0:7.27.0-1.el7sat.x86_64", "7Workstation-satellite-client-6:puppet-agent-0:7.27.0-1.el7sat.src", "7Workstation-satellite-client-6:puppet-agent-0:7.27.0-1.el7sat.x86_64", "8Base-satellite-client-6:puppet-agent-0:7.27.0-1.el8sat.src", "8Base-satellite-client-6:puppet-agent-0:7.27.0-1.el8sat.x86_64", "9Base-satellite-client-6:puppet-agent-0:7.27.0-1.el9sat.src", "9Base-satellite-client-6:puppet-agent-0:7.27.0-1.el9sat.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "curl: heap based buffer overflow in the SOCKS5 proxy handshake" } ] }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.