Important: Satellite 6.10.5 Async Bug Fix Update
Security Advisory: Important
Identify and remediate systems affected by this advisory.
Updated Satellite 6.10 packages that fix several bugs are now available for Red Hat Satellite.
Red Hat Satellite is a system management solution that allows organizations to configure and maintain their systems without the necessity to provide public Internet access to their servers or other client systems. It performs provisioning and configuration management of predefined standard operating environments.
Security Fix(es):
2023859 puppet: unsafe HTTP redirect (CVE-2021-27023)
2023853 puppet: silent configuration failure in agent (CVE-2021-27025)
This update fixes the following bugs:
2070996 Upgrade to Satellite 6.10 fails at db:migrate stage if there are errata reference present for some ostree\puppet type repos
2070991 Warning: postgresql.service changed on disk, when calling foreman-maintain service restart
2071004 Config report upload failed with No smart proxy server found on [capsule.example.com] and is not in trusted_hosts
2070984 Uploading external DISA SCAP content to satellite 6.10 fails with exception Invalid SCAP file type
2075031 Content Import does not delete version on failure
2070985 Upgrading from Satellite 6.9 to Satellite 6.10.3 fails with error undefined method operatingsystems for nil:NilClass during the db:migrate step
2070994 Index content is creating duplicated errata in katello_erratum table after upgrading to Satellite 6.10
2070999 Fail to import contents when the connected and disconnected Satellite have different product labels for the same product
2071002 Error when importing content and same package belongs to multiple repositories
2071006 Content not accessible after importing
2076979 Wrong satellite version on login screen
2077046 Upgrade fails during db:migrate with PG::ForeignKeyViolation: ERROR: update or delete on table katello_errata violates foreign key constraint katello_content_facet_errata_errata_id
Users of Red Hat Satellite are advised to upgrade to these updated packages, which fix these bugs.
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For detailed instructions how to apply this update, refer to: