{"id":"RHSA-2026:2760","summary":"Red Hat Security Advisory: Satellite 6.18.3 Async Update","modified":"2026-04-27T10:05:51Z","published":"2026-02-17T10:12:34Z","upstream":["CVE-2025-53643","CVE-2025-66471","CVE-2026-21441"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2026:2760"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#important"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2380000"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2419467"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2427726"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/SAT-35237"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/SAT-39454"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/SAT-41521"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/SAT-41522"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/SAT-41523"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/SAT-41524"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/SAT-41525"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/SAT-41526"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/SAT-41527"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/SAT-41528"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/SAT-42125"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2760.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-53643"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2025-53643"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-53643"},{"type":"ARTICLE","url":"https://github.com/aio-libs/aiohttp/commit/e8d774f635dc6d1cd3174d0e38891da5de0e2b6a"},{"type":"ARTICLE","url":"https://github.com/aio-libs/aiohttp/security/advisories/GHSA-9548-qrrj-x5pj"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-66471"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2025-66471"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-66471"},{"type":"ARTICLE","url":"https://github.com/urllib3/urllib3/commit/c19571de34c47de3a766541b041637ba5f716ed7"},{"type":"ARTICLE","url":"https://github.com/urllib3/urllib3/security/advisories/GHSA-2xpw-w6gg-jr37"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2026-21441"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2026-21441"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-21441"},{"type":"ARTICLE","url":"https://github.com/urllib3/urllib3/commit/8864ac407bba8607950025e0979c4c69bc7abc7b"},{"type":"ARTICLE","url":"https://github.com/urllib3/urllib3/security/advisories/GHSA-38jv-5279-wg99"}],"affected":[{"package":{"name":"python3.12-aiohttp","ecosystem":"Red Hat:satellite_capsule:6.18::el9","purl":"pkg:rpm/redhat/python3.12-aiohttp"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.13.3-1.el9pc"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:2760.json"}},{"package":{"name":"python3.12-aiohttp-debuginfo","ecosystem":"Red Hat:satellite_capsule:6.18::el9","purl":"pkg:rpm/redhat/python3.12-aiohttp-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.13.3-1.el9pc"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:2760.json"}},{"package":{"name":"python3.12-aiohttp-debugsource","ecosystem":"Red Hat:satellite_capsule:6.18::el9","purl":"pkg:rpm/redhat/python3.12-aiohttp-debugsource"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.13.3-1.el9pc"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:2760.json"}},{"package":{"name":"python3.12-aiohttp","ecosystem":"Red Hat:satellite:6.18::el9","purl":"pkg:rpm/redhat/python3.12-aiohttp"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.13.3-1.el9pc"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:2760.json"}},{"package":{"name":"python3.12-aiohttp-debuginfo","ecosystem":"Red Hat:satellite:6.18::el9","purl":"pkg:rpm/redhat/python3.12-aiohttp-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.13.3-1.el9pc"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:2760.json"}},{"package":{"name":"python3.12-aiohttp-debugsource","ecosystem":"Red Hat:satellite:6.18::el9","purl":"pkg:rpm/redhat/python3.12-aiohttp-debugsource"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.13.3-1.el9pc"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:2760.json"}},{"package":{"name":"python3.12-urllib3","ecosystem":"Red Hat:satellite_capsule:6.18::el9","purl":"pkg:rpm/redhat/python3.12-urllib3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.6.3-1.el9pc"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:2760.json"}},{"package":{"name":"python3.12-urllib3","ecosystem":"Red Hat:satellite:6.18::el9","purl":"pkg:rpm/redhat/python3.12-urllib3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.6.3-1.el9pc"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2026:2760.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}