Описание
Security update for smt, yast2-smt
This update for yast2-smt to 3.0.14 and smt to 3.0.37 fixes the following issues:
These security issues were fixed in SMT:
- CVE-2018-12471: Xml External Entity processing in the RegistrationSharing modules allowed to read arbitrary file read (bsc#1103809).
- CVE-2018-12470: SQL injection in RegistrationSharing module allows remote attackers to run arbitrary SQL statements (bsc#1103810).
- CVE-2018-12472: Authentication bypass in sibling check facilitated further attacks on SMT (bsc#1104076).
SUSE would like to thank Jake Miller for reporting these issues to us.
These non-security issues were fixed in SMT:
- Fix cron jobs randomization (bsc#1097560)
- Fix duplicate migration paths (bsc#1097824)
This non-security issue was fixed in yast2-smt:
- Remove cron job rescheduling (bsc#1097560)
- Added missing translation marks (bsc#1037811)
- Explicitly mention 'Organization Credentials' (fate#321759)
- Rearrange the SMT set-up dialog (bsc#977043)
- Make the Filter button default (bsc#1006984)
- Prevent exiting the repo selection dialog via hitting Enter in the repository filter (bsc#1006984)
- report when error occurs during repo mirroring (bsc#1006989)
- Use TextEntry-based filter for repos (fate#319777)
Список пакетов
SUSE Linux Enterprise Server 12 SP2-BCL
Ссылки
- Link for SUSE-SU-2018:2898-2
- E-Mail link for SUSE-SU-2018:2898-2
- SUSE Security Ratings
- SUSE Bug 1006984
- SUSE Bug 1006989
- SUSE Bug 1037811
- SUSE Bug 1097560
- SUSE Bug 1097824
- SUSE Bug 1103809
- SUSE Bug 1103810
- SUSE Bug 1104076
- SUSE Bug 977043
- SUSE CVE CVE-2018-12470 page
- SUSE CVE CVE-2018-12471 page
- SUSE CVE CVE-2018-12472 page
Описание
A SQL Injection in the RegistrationSharing module of SUSE Linux SMT allows remote attackers to cause execute arbitrary SQL statements. Affected releases are SUSE Linux SMT: versions prior to 3.0.37.
Затронутые продукты
Ссылки
- CVE-2018-12470
- SUSE Bug 1103810
Описание
A External Entity Reference ('XXE') vulnerability in SUSE Linux SMT allows remote attackers to read data from the server or cause DoS by referencing blocking elements. Affected releases are SUSE Linux SMT: versions prior to 3.0.37.
Затронутые продукты
Ссылки
- CVE-2018-12471
- SUSE Bug 1103809
Описание
A improper authentication using the HOST header in SUSE Linux SMT allows remote attackers to spoof a sibling server. Affected releases are SUSE Linux SMT: versions prior to 3.0.37.
Затронутые продукты
Ссылки
- CVE-2018-12472
- SUSE Bug 1104076