RHEL 8/9:Satellite 6.16.3 异步更新(中等)(RHSA-2025:2399)

medium Nessus 插件 ID 232538

简介

远程 Red Hat 主机缺少一个或多个安全更新。

描述

远程 Redhat Enterprise Linux 8/9 主机上安装的多个程序包受到 RHSA-2025:2399 公告中提及的多个漏洞影响。

Red Hat Satellite 是一个系统管理解决方案,它使组织能够配置和维护其系统,而无需为自身服务器或其他客户端系统提供公共 Internet 访问。该解决方案可执行预定义标准操作环境的设置和配置管理。

安全修复:

* python-jinja2:Jinja 中存在通过间接引用格式化方法造成的沙盒突破漏洞 (CVE-2024-56326)

* python-django:IPv6 验证中可能存在的拒绝服务漏洞 (CVE-2024-56374)

建议 Red Hat Satellite 用户升级至这些更新后的程序包,其中修复了这些问题。

Tenable 已直接从 Red Hat Enterprise Linux 安全公告中提取上述描述块。

请注意,Nessus 尚未测试这些问题,而是只依据应用程序自我报告的版本号进行判断。

解决方案

更新受影响的程序包。

另见

https://access.redhat.com/security/updates/classification/#moderate

http://www.nessus.org/u?e94bfd15

https://bugzilla.redhat.com/show_bug.cgi?id=2333856

https://bugzilla.redhat.com/show_bug.cgi?id=2337996

https://issues.redhat.com/browse/SAT-30027

https://issues.redhat.com/browse/SAT-30099

https://issues.redhat.com/browse/SAT-30256

https://issues.redhat.com/browse/SAT-30283

https://issues.redhat.com/browse/SAT-30293

https://issues.redhat.com/browse/SAT-30294

https://issues.redhat.com/browse/SAT-30918

https://issues.redhat.com/browse/SAT-30934

https://issues.redhat.com/browse/SAT-30936

https://issues.redhat.com/browse/SAT-30937

https://issues.redhat.com/browse/SAT-30938

https://issues.redhat.com/browse/SAT-30939

https://issues.redhat.com/browse/SAT-30940

https://issues.redhat.com/browse/SAT-30941

https://issues.redhat.com/browse/SAT-30942

https://issues.redhat.com/browse/SAT-30954

https://issues.redhat.com/browse/SAT-30955

http://www.nessus.org/u?a2f33b8c

https://access.redhat.com/errata/RHSA-2025:2399

插件详情

严重性: Medium

ID: 232538

文件名: redhat-RHSA-2025-2399.nasl

版本: 1.3

类型: local

代理: unix

发布时间: 2025/3/10

最近更新时间: 2025/6/5

支持的传感器: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

风险信息

VPR

风险因素: Medium

分数: 5.9

Vendor

Vendor Severity: Moderate

CVSS v2

风险因素: High

基本分数: 7.6

时间分数: 5.6

矢量: CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C

CVSS 分数来源: CVE-2024-56326

CVSS v3

风险因素: High

基本分数: 7.8

时间分数: 6.8

矢量: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

时间矢量: CVSS:3.0/E:U/RL:O/RC:C

CVSS v4

风险因素: Medium

Base Score: 5.4

Threat Score: 2

Threat Vector: CVSS:4.0/E:U

Vector: CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

漏洞信息

CPE: p-cpe:/a:redhat:enterprise_linux:python-pulpcore, p-cpe:/a:redhat:enterprise_linux:python3.11-pulp-container, p-cpe:/a:redhat:enterprise_linux:python3.11-pulpcore, p-cpe:/a:redhat:enterprise_linux:satellite, p-cpe:/a:redhat:enterprise_linux:foreman-service, p-cpe:/a:redhat:enterprise_linux:satellite-cli, p-cpe:/a:redhat:enterprise_linux:foreman-vmware, p-cpe:/a:redhat:enterprise_linux:satellite-capsule, p-cpe:/a:redhat:enterprise_linux:foreman, p-cpe:/a:redhat:enterprise_linux:foreman-installer-katello, p-cpe:/a:redhat:enterprise_linux:python-pulp-container, p-cpe:/a:redhat:enterprise_linux:foreman-telemetry, p-cpe:/a:redhat:enterprise_linux:python3.11-pulp-cli, p-cpe:/a:redhat:enterprise_linux:python3.11-jinja2, p-cpe:/a:redhat:enterprise_linux:rubygem-katello, p-cpe:/a:redhat:enterprise_linux:rubygem-foreman_openscap, p-cpe:/a:redhat:enterprise_linux:foreman-postgresql, p-cpe:/a:redhat:enterprise_linux:foreman-dynflow-sidekiq, p-cpe:/a:redhat:enterprise_linux:rubygem-foreman_maintain, p-cpe:/a:redhat:enterprise_linux:rubygem-foreman_theme_satellite, p-cpe:/a:redhat:enterprise_linux:foreman-pcp, cpe:/o:redhat:enterprise_linux:9, p-cpe:/a:redhat:enterprise_linux:foreman-ec2, p-cpe:/a:redhat:enterprise_linux:python3.11-pulp-glue, p-cpe:/a:redhat:enterprise_linux:python-pulp-cli, p-cpe:/a:redhat:enterprise_linux:foreman-openstack, p-cpe:/a:redhat:enterprise_linux:foreman-cli, p-cpe:/a:redhat:enterprise_linux:python-jinja2, p-cpe:/a:redhat:enterprise_linux:python-requests, cpe:/o:redhat:enterprise_linux:8, p-cpe:/a:redhat:enterprise_linux:foreman-journald, p-cpe:/a:redhat:enterprise_linux:rubygem-foreman_ansible, p-cpe:/a:redhat:enterprise_linux:foreman-redis, p-cpe:/a:redhat:enterprise_linux:rubygem-foreman_remote_execution-cockpit, p-cpe:/a:redhat:enterprise_linux:foreman-installer, p-cpe:/a:redhat:enterprise_linux:foreman-ovirt, p-cpe:/a:redhat:enterprise_linux:candlepin-selinux, p-cpe:/a:redhat:enterprise_linux:python3.11-requests, p-cpe:/a:redhat:enterprise_linux:rubygem-foreman_remote_execution, p-cpe:/a:redhat:enterprise_linux:python3.11-django, p-cpe:/a:redhat:enterprise_linux:python-django, p-cpe:/a:redhat:enterprise_linux:candlepin, p-cpe:/a:redhat:enterprise_linux:python-pulp-glue, p-cpe:/a:redhat:enterprise_linux:foreman-libvirt, p-cpe:/a:redhat:enterprise_linux:scap-security-guide-satellite, p-cpe:/a:redhat:enterprise_linux:foreman-debug, p-cpe:/a:redhat:enterprise_linux:satellite-common

必需的 KB 项: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

易利用性: No known exploits are available

补丁发布日期: 2025/3/5

漏洞发布日期: 2024/12/21

参考资料信息

CVE: CVE-2024-35195, CVE-2024-56326, CVE-2024-56374

CWE: 670, 693, 770

RHSA: 2025:2399