Vulnerability Database
Blog
FAQ
Docs
arrow_forward
search
light_mode
dark_mode
RHSA-2026:14835
See a problem?
Please try reporting it
to the source
first.
Source
https://access.redhat.com/errata/RHSA-2026:14835
Import Source
https://security.access.redhat.com/data/osv/RHSA-2026:14835.json
JSON Data
https://api.osv.dev/v1/vulns/RHSA-2026:14835
Upstream
CVE-2025-14550
CVE-2025-69534
CVE-2026-1207
CVE-2026-1285
CVE-2026-1287
CVE-2026-1312
CVE-2026-27459
CVE-2026-33176
Published
2026-05-08T10:05:25Z
Modified
2026-05-09T10:04:17Z
Severity
8.5 (High)
CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
CVSS Calculator
Summary
Red Hat Security Advisory: Satellite 6.18.5 Async Update
Details
References
https://access.redhat.com/errata/RHSA-2026:14835
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/documentation/en-us/red_hat_satellite/6.18/html/updating_red_hat_satellite/index
https://issues.redhat.com/browse/SAT-37836
https://issues.redhat.com/browse/SAT-43946
https://issues.redhat.com/browse/SAT-43947
https://issues.redhat.com/browse/SAT-43948
https://issues.redhat.com/browse/SAT-43949
https://issues.redhat.com/browse/SAT-43950
https://issues.redhat.com/browse/SAT-43951
https://issues.redhat.com/browse/SAT-43952
https://issues.redhat.com/browse/SAT-43953
https://issues.redhat.com/browse/SAT-43954
https://issues.redhat.com/browse/SAT-43955
https://issues.redhat.com/browse/SAT-43956
https://issues.redhat.com/browse/SAT-43958
https://issues.redhat.com/browse/SAT-43959
https://issues.redhat.com/browse/SAT-43960
https://issues.redhat.com/browse/SAT-43962
https://issues.redhat.com/browse/SAT-43963
https://issues.redhat.com/browse/SAT-44062
https://issues.redhat.com/browse/SAT-44760
https://issues.redhat.com/browse/SAT-44761
https://issues.redhat.com/browse/SAT-44762
https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_14835.json
https://access.redhat.com/security/cve/CVE-2025-14550
https://bugzilla.redhat.com/show_bug.cgi?id=2436341
https://www.cve.org/CVERecord?id=CVE-2025-14550
https://nvd.nist.gov/vuln/detail/CVE-2025-14550
https://docs.djangoproject.com/en/dev/releases/security/
https://groups.google.com/g/django-announce
https://www.djangoproject.com/weblog/2026/feb/03/security-releases/
https://access.redhat.com/security/cve/CVE-2025-69534
https://bugzilla.redhat.com/show_bug.cgi?id=2444839
https://www.cve.org/CVERecord?id=CVE-2025-69534
https://nvd.nist.gov/vuln/detail/CVE-2025-69534
https://github.com/Python-Markdown/markdown
https://github.com/Python-Markdown/markdown/actions/runs/15736122892
https://github.com/Python-Markdown/markdown/issues/1534
https://access.redhat.com/security/cve/CVE-2026-1207
https://bugzilla.redhat.com/show_bug.cgi?id=2436338
https://www.cve.org/CVERecord?id=CVE-2026-1207
https://nvd.nist.gov/vuln/detail/CVE-2026-1207
https://access.redhat.com/security/cve/CVE-2026-1285
https://bugzilla.redhat.com/show_bug.cgi?id=2436340
https://www.cve.org/CVERecord?id=CVE-2026-1285
https://nvd.nist.gov/vuln/detail/CVE-2026-1285
https://access.redhat.com/security/cve/CVE-2026-1287
https://bugzilla.redhat.com/show_bug.cgi?id=2436339
https://www.cve.org/CVERecord?id=CVE-2026-1287
https://nvd.nist.gov/vuln/detail/CVE-2026-1287
https://access.redhat.com/security/cve/CVE-2026-1312
https://bugzilla.redhat.com/show_bug.cgi?id=2436342
https://www.cve.org/CVERecord?id=CVE-2026-1312
https://nvd.nist.gov/vuln/detail/CVE-2026-1312
https://access.redhat.com/security/cve/CVE-2026-27459
https://bugzilla.redhat.com/show_bug.cgi?id=2448503
https://www.cve.org/CVERecord?id=CVE-2026-27459
https://nvd.nist.gov/vuln/detail/CVE-2026-27459
https://github.com/pyca/pyopenssl/blob/358cbf29c4e364c59930e53a270116249581eaa3/CHANGELOG.rst
https://github.com/pyca/pyopenssl/commit/57f09bb4bb051d3bc2a1abd36e9525313d5cd408
https://github.com/pyca/pyopenssl/security/advisories/GHSA-5pwr-322w-8jr4
https://access.redhat.com/security/cve/CVE-2026-33176
https://bugzilla.redhat.com/show_bug.cgi?id=2450551
https://www.cve.org/CVERecord?id=CVE-2026-33176
https://nvd.nist.gov/vuln/detail/CVE-2026-33176
https://github.com/rails/rails/commit/19dbab51ca086a657bb86458042bc44314916bcb
https://github.com/rails/rails/commit/ebd6be18120d1136511eb516338e27af25ac0a1a
https://github.com/rails/rails/commit/ee2c59e730e5b8faed502cd2c573109df093f856
https://github.com/rails/rails/releases/tag/v7.2.3.1
https://github.com/rails/rails/releases/tag/v8.0.4.1
https://github.com/rails/rails/releases/tag/v8.1.2.1
https://github.com/rails/rails/security/advisories/GHSA-2j26-frm8-cmj9
Affected packages
Red Hat:satellite:6.18::el9
python3.12-django
Package
Name
python3.12-django
Purl
pkg:rpm/redhat/python3.12-django
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:4.2.30-1.el9pc
Database specific
source
"https://security.access.redhat.com/data/osv/RHSA-2026:14835.json"
python3.12-markdown
Package
Name
python3.12-markdown
Purl
pkg:rpm/redhat/python3.12-markdown
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:3.8.2-1.el9pc
Database specific
source
"https://security.access.redhat.com/data/osv/RHSA-2026:14835.json"
python3.12-pyOpenSSL
Package
Name
python3.12-pyOpenSSL
Purl
pkg:rpm/redhat/python3.12-pyOpenSSL
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:26.0.0-2.el9pc
Database specific
source
"https://security.access.redhat.com/data/osv/RHSA-2026:14835.json"
rubygem-activesupport
Package
Name
rubygem-activesupport
Purl
pkg:rpm/redhat/rubygem-activesupport
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:7.0.8.7-2.el9sat
Database specific
source
"https://security.access.redhat.com/data/osv/RHSA-2026:14835.json"
Red Hat:satellite_capsule:6.18::el9
python3.12-django
Package
Name
python3.12-django
Purl
pkg:rpm/redhat/python3.12-django
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:4.2.30-1.el9pc
Database specific
source
"https://security.access.redhat.com/data/osv/RHSA-2026:14835.json"
python3.12-markdown
Package
Name
python3.12-markdown
Purl
pkg:rpm/redhat/python3.12-markdown
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:3.8.2-1.el9pc
Database specific
source
"https://security.access.redhat.com/data/osv/RHSA-2026:14835.json"
python3.12-pyOpenSSL
Package
Name
python3.12-pyOpenSSL
Purl
pkg:rpm/redhat/python3.12-pyOpenSSL
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:26.0.0-2.el9pc
Database specific
source
"https://security.access.redhat.com/data/osv/RHSA-2026:14835.json"
rubygem-activesupport
Package
Name
rubygem-activesupport
Purl
pkg:rpm/redhat/rubygem-activesupport
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
0:7.0.8.7-2.el9sat
Database specific
source
"https://security.access.redhat.com/data/osv/RHSA-2026:14835.json"
RHSA-2026:14835 - OSV