{"id":"RHSA-2024:0797","summary":"Red Hat Security Advisory: Satellite 6.14.2 Async Security Update","modified":"2026-04-02T10:06:56Z","published":"2024-09-30T07:12:50Z","upstream":["CVE-2023-0809","CVE-2023-26049","CVE-2023-26141","CVE-2023-28366","CVE-2023-3592","CVE-2023-36479","CVE-2023-38545","CVE-2023-40167","CVE-2023-40175","CVE-2023-4785"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:0797"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#important"},{"type":"ARTICLE","url":"https://access.redhat.com/documentation/en-us/red_hat_satellite/6.14/html/upgrading_and_updating_red_hat_satellite/index"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2232729"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2236341"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2236882"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2239010"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2239017"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2239630"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2239634"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2241933"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2250347"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2254974"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255260"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2257321"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2257324"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2257326"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2257327"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2257329"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2257330"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2257331"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2257332"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2257415"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2260525"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2262131"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_0797.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-0809"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-0809"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-0809"},{"type":"ARTICLE","url":"https://github.com/eclipse/mosquitto/commit/6113eac95a9df634fbc858be542c4a0456bfe7b9"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-3592"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-3592"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-3592"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-4785"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-4785"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-4785"},{"type":"ADVISORY","url":"https://github.com/advisories/GHSA-p25m-jpj4-qcrr"},{"type":"ARTICLE","url":"https://github.com/grpc/grpc/pull/33656"},{"type":"ARTICLE","url":"https://github.com/grpc/grpc/pull/33667"},{"type":"ARTICLE","url":"https://github.com/grpc/grpc/pull/33669"},{"type":"ARTICLE","url":"https://github.com/grpc/grpc/pull/33670"},{"type":"ARTICLE","url":"https://github.com/grpc/grpc/pull/33672"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-26049"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-26049"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-26049"},{"type":"ARTICLE","url":"https://github.com/eclipse/jetty.project/security/advisories/GHSA-p26g-97m4-6q7c"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-26141"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-26141"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-26141"},{"type":"ARTICLE","url":"https://github.com/sidekiq/sidekiq/commit/62c90d7c5a7d8a378d79909859d87c2e0702bf89"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-28366"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-28366"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-28366"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-36479"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-36479"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-36479"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-38545"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-38545"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-38545"},{"type":"ARTICLE","url":"https://curl.se/docs/CVE-2023-38545.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-40167"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-40167"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-40167"},{"type":"ARTICLE","url":"https://github.com/eclipse/jetty.project/security/advisories/GHSA-hmr7-m48g-48f6"},{"type":"ARTICLE","url":"https://www.rfc-editor.org/rfc/rfc9110#section-8.6"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-40175"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-40175"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-40175"},{"type":"ARTICLE","url":"https://github.com/puma/puma/security/advisories/GHSA-68xg-gqqm-vgj8"}],"affected":[{"package":{"name":"mosquitto","ecosystem":"Red Hat:satellite_capsule:6.14::el8","purl":"pkg:rpm/redhat/mosquitto"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.0.17-1.el8sat"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0797.json"}},{"package":{"name":"mosquitto-debuginfo","ecosystem":"Red Hat:satellite_capsule:6.14::el8","purl":"pkg:rpm/redhat/mosquitto-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.0.17-1.el8sat"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0797.json"}},{"package":{"name":"mosquitto-debugsource","ecosystem":"Red Hat:satellite_capsule:6.14::el8","purl":"pkg:rpm/redhat/mosquitto-debugsource"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.0.17-1.el8sat"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0797.json"}},{"package":{"name":"mosquitto","ecosystem":"Red Hat:satellite:6.14::el8","purl":"pkg:rpm/redhat/mosquitto"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.0.17-1.el8sat"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0797.json"}},{"package":{"name":"mosquitto-debuginfo","ecosystem":"Red Hat:satellite:6.14::el8","purl":"pkg:rpm/redhat/mosquitto-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.0.17-1.el8sat"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0797.json"}},{"package":{"name":"mosquitto-debugsource","ecosystem":"Red Hat:satellite:6.14::el8","purl":"pkg:rpm/redhat/mosquitto-debugsource"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.0.17-1.el8sat"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0797.json"}},{"package":{"name":"rubygem-grpc","ecosystem":"Red Hat:satellite:6.14::el8","purl":"pkg:rpm/redhat/rubygem-grpc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.58.0-1.el8sat"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0797.json"}},{"package":{"name":"puppetserver","ecosystem":"Red Hat:satellite_capsule:6.14::el8","purl":"pkg:rpm/redhat/puppetserver"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.14.0-1.el8sat"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0797.json"}},{"package":{"name":"puppetserver","ecosystem":"Red Hat:satellite:6.14::el8","purl":"pkg:rpm/redhat/puppetserver"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.14.0-1.el8sat"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0797.json"}},{"package":{"name":"rubygem-sidekiq","ecosystem":"Red Hat:satellite:6.14::el8","purl":"pkg:rpm/redhat/rubygem-sidekiq"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.5.12-1.el8sat"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0797.json"}},{"package":{"name":"candlepin","ecosystem":"Red Hat:satellite:6.14::el8","purl":"pkg:rpm/redhat/candlepin"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.3.11-1.el8sat"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0797.json"}},{"package":{"name":"candlepin-selinux","ecosystem":"Red Hat:satellite:6.14::el8","purl":"pkg:rpm/redhat/candlepin-selinux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.3.11-1.el8sat"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0797.json"}},{"package":{"name":"puppet-agent","ecosystem":"Red Hat:satellite_capsule:6.14::el8","purl":"pkg:rpm/redhat/puppet-agent"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.27.0-1.el8sat"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0797.json"}},{"package":{"name":"puppet-agent","ecosystem":"Red Hat:satellite:6.14::el8","purl":"pkg:rpm/redhat/puppet-agent"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.27.0-1.el8sat"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0797.json"}},{"package":{"name":"rubygem-puma","ecosystem":"Red Hat:satellite:6.14::el8","purl":"pkg:rpm/redhat/rubygem-puma"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.3.1-1.el8sat"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0797.json"}},{"package":{"name":"rubygem-puma-debuginfo","ecosystem":"Red Hat:satellite:6.14::el8","purl":"pkg:rpm/redhat/rubygem-puma-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.3.1-1.el8sat"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0797.json"}},{"package":{"name":"rubygem-puma-debugsource","ecosystem":"Red Hat:satellite:6.14::el8","purl":"pkg:rpm/redhat/rubygem-puma-debugsource"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.3.1-1.el8sat"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0797.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}