RHEL 8 / 9:Satellite 6.16.3 非同步更新 (中等) (RHSA-2025:2399)

medium Nessus Plugin ID 232538

概要

遠端 Red Hat 主機缺少一個或多個安全性更新。

說明

遠端 Redhat Enterprise Linux 8/9 主機上安裝的套件受到 RHSA-2025:2399 公告中提及的多個弱點影響。

Red Hat Satellite 是一套系統管理解決方案,讓組織無須為其伺服器或其他用戶端系統提供公共網際網路存取,就可以設定和維護系統。可執行預先定義標準作業環境的佈建和組態管理。

安全性修正:

* python-jinja2:Jinja 中包含透過間接參照格式化方法造成的沙箱突破弱點 (CVE-2024-56326)

* python-django:IPv6 驗證中潛在的拒絕服務弱點 (CVE-2024-56374)

建議 Red Hat Satellite 使用者皆升級至這些更新版套件,這些套件可修正這些問題。

Tenable 已直接從 Red Hat Enterprise Linux 安全公告擷取前置描述區塊。

請注意,Nessus 並未測試這些問題,而是僅依據應用程式自我報告的版本號碼作出判斷。

解決方案

更新受影響的套件。

另請參閱

https://access.redhat.com/security/updates/classification/#moderate

http://www.nessus.org/u?e94bfd15

https://bugzilla.redhat.com/show_bug.cgi?id=2333856

https://bugzilla.redhat.com/show_bug.cgi?id=2337996

https://issues.redhat.com/browse/SAT-30027

https://issues.redhat.com/browse/SAT-30099

https://issues.redhat.com/browse/SAT-30256

https://issues.redhat.com/browse/SAT-30283

https://issues.redhat.com/browse/SAT-30293

https://issues.redhat.com/browse/SAT-30294

https://issues.redhat.com/browse/SAT-30918

https://issues.redhat.com/browse/SAT-30934

https://issues.redhat.com/browse/SAT-30936

https://issues.redhat.com/browse/SAT-30937

https://issues.redhat.com/browse/SAT-30938

https://issues.redhat.com/browse/SAT-30939

https://issues.redhat.com/browse/SAT-30940

https://issues.redhat.com/browse/SAT-30941

https://issues.redhat.com/browse/SAT-30942

https://issues.redhat.com/browse/SAT-30954

https://issues.redhat.com/browse/SAT-30955

http://www.nessus.org/u?a2f33b8c

https://access.redhat.com/errata/RHSA-2025:2399

Plugin 詳細資訊

嚴重性: Medium

ID: 232538

檔案名稱: redhat-RHSA-2025-2399.nasl

版本: 1.3

類型: local

代理程式: unix

已發布: 2025/3/10

已更新: 2025/6/5

支援的感應器: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

風險資訊

VPR

風險因素: Medium

分數: 5.9

Vendor

Vendor Severity: Moderate

CVSS v2

風險因素: High

基本分數: 7.6

時間性分數: 5.6

媒介: CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C

CVSS 評分資料來源: CVE-2024-56326

CVSS v3

風險因素: High

基本分數: 7.8

時間性分數: 6.8

媒介: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

時間媒介: CVSS:3.0/E:U/RL:O/RC:C

CVSS v4

風險因素: Medium

Base Score: 5.4

Threat Score: 2

Threat Vector: CVSS:4.0/E:U

Vector: CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

弱點資訊

CPE: p-cpe:/a:redhat:enterprise_linux:python-pulpcore, p-cpe:/a:redhat:enterprise_linux:python3.11-pulp-container, p-cpe:/a:redhat:enterprise_linux:python3.11-pulpcore, p-cpe:/a:redhat:enterprise_linux:satellite, p-cpe:/a:redhat:enterprise_linux:foreman-service, p-cpe:/a:redhat:enterprise_linux:satellite-cli, p-cpe:/a:redhat:enterprise_linux:foreman-vmware, p-cpe:/a:redhat:enterprise_linux:satellite-capsule, p-cpe:/a:redhat:enterprise_linux:foreman, p-cpe:/a:redhat:enterprise_linux:foreman-installer-katello, p-cpe:/a:redhat:enterprise_linux:python-pulp-container, p-cpe:/a:redhat:enterprise_linux:foreman-telemetry, p-cpe:/a:redhat:enterprise_linux:python3.11-pulp-cli, p-cpe:/a:redhat:enterprise_linux:python3.11-jinja2, p-cpe:/a:redhat:enterprise_linux:rubygem-katello, p-cpe:/a:redhat:enterprise_linux:rubygem-foreman_openscap, p-cpe:/a:redhat:enterprise_linux:foreman-postgresql, p-cpe:/a:redhat:enterprise_linux:foreman-dynflow-sidekiq, p-cpe:/a:redhat:enterprise_linux:rubygem-foreman_maintain, p-cpe:/a:redhat:enterprise_linux:rubygem-foreman_theme_satellite, p-cpe:/a:redhat:enterprise_linux:foreman-pcp, cpe:/o:redhat:enterprise_linux:9, p-cpe:/a:redhat:enterprise_linux:foreman-ec2, p-cpe:/a:redhat:enterprise_linux:python3.11-pulp-glue, p-cpe:/a:redhat:enterprise_linux:python-pulp-cli, p-cpe:/a:redhat:enterprise_linux:foreman-openstack, p-cpe:/a:redhat:enterprise_linux:foreman-cli, p-cpe:/a:redhat:enterprise_linux:python-jinja2, p-cpe:/a:redhat:enterprise_linux:python-requests, cpe:/o:redhat:enterprise_linux:8, p-cpe:/a:redhat:enterprise_linux:foreman-journald, p-cpe:/a:redhat:enterprise_linux:rubygem-foreman_ansible, p-cpe:/a:redhat:enterprise_linux:foreman-redis, p-cpe:/a:redhat:enterprise_linux:rubygem-foreman_remote_execution-cockpit, p-cpe:/a:redhat:enterprise_linux:foreman-installer, p-cpe:/a:redhat:enterprise_linux:foreman-ovirt, p-cpe:/a:redhat:enterprise_linux:candlepin-selinux, p-cpe:/a:redhat:enterprise_linux:python3.11-requests, p-cpe:/a:redhat:enterprise_linux:rubygem-foreman_remote_execution, p-cpe:/a:redhat:enterprise_linux:python3.11-django, p-cpe:/a:redhat:enterprise_linux:python-django, p-cpe:/a:redhat:enterprise_linux:candlepin, p-cpe:/a:redhat:enterprise_linux:python-pulp-glue, p-cpe:/a:redhat:enterprise_linux:foreman-libvirt, p-cpe:/a:redhat:enterprise_linux:scap-security-guide-satellite, p-cpe:/a:redhat:enterprise_linux:foreman-debug, p-cpe:/a:redhat:enterprise_linux:satellite-common

必要的 KB 項目: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

可輕鬆利用: No known exploits are available

修補程式發佈日期: 2025/3/5

弱點發布日期: 2024/12/21

參考資訊

CVE: CVE-2024-35195, CVE-2024-56326, CVE-2024-56374

CWE: 670, 693, 770

RHSA: 2025:2399