Описание
Security update for rmt-server
This update for rmt-server to version 2.3.1 fixes the following issues:
- Fix mirroring logic when errors are encountered (bsc#1140492)
- Refactor RMT::Mirror to download metadata/licenses in parallel
- Check repo metadata GPG signatures during mirroring (bsc#1132690)
- Add rmt-server-config subpackage with nginx configs (fate#327816, bsc#1136081)
- Fix dependency to removed boot_cli_i18n file (bsc#1136020)
- Add
rmt-cli systems list
command to list registered systems - Fix create UUID when system_uuid file empty (bsc#1138316)
- Fix duplicate nginx location in rmt-server-pubcloud (bsc#1135222)
- Mirror additional repos that were enabled during mirroring (bsc#1132690)
- Make service IDs consistent across different RMT instances (bsc#1134428)
- Make SMT data import scripts faster (bsc#1134190)
- Fix incorrect triggering of registration sharing (bsc#1129392)
- Fix license mirroring issue in some non-SUSE repositories (bsc#1128858)
- Update dependencies to fix vulnerabilities in rails (CVE-2019-5419, bsc#1129271) and nokogiri (CVE-2019-11068, bsc#1132160)
- Allow RMT registration to work under HTTP as well as HTTPS.
- Offline migration from SLE 15 to SLE 15 SP1 will add Python2 module
- Online migrations will automatically add additional modules to the client systems depending on the base product
- Supply log severity to journald
- Breaking Change: Added headers to generated CSV files
Список пакетов
SUSE Linux Enterprise Module for Public Cloud 15 SP1
rmt-server-pubcloud-2.3.1-3.3.3
SUSE Linux Enterprise Module for Server Applications 15 SP1
rmt-server-2.3.1-3.3.3
rmt-server-config-2.3.1-3.3.3
Ссылки
- Link for SUSE-SU-2019:1973-1
- E-Mail link for SUSE-SU-2019:1973-1
- SUSE Security Ratings
- SUSE Bug 1128858
- SUSE Bug 1129271
- SUSE Bug 1129392
- SUSE Bug 1132160
- SUSE Bug 1132690
- SUSE Bug 1134190
- SUSE Bug 1134428
- SUSE Bug 1135222
- SUSE Bug 1136020
- SUSE Bug 1136081
- SUSE Bug 1138316
- SUSE Bug 1140492
- SUSE CVE CVE-2019-11068 page
- SUSE CVE CVE-2019-5419 page
Описание
libxslt through 1.1.33 allows bypass of a protection mechanism because callers of xsltCheckRead and xsltCheckWrite permit access even upon receiving a -1 error code. xsltCheckRead can return -1 for a crafted URL that is not actually invalid and is subsequently loaded.
Затронутые продукты
SUSE Linux Enterprise Module for Public Cloud 15 SP1:rmt-server-pubcloud-2.3.1-3.3.3
SUSE Linux Enterprise Module for Server Applications 15 SP1:rmt-server-2.3.1-3.3.3
SUSE Linux Enterprise Module for Server Applications 15 SP1:rmt-server-config-2.3.1-3.3.3
Ссылки
- CVE-2019-11068
- SUSE Bug 1132160
- SUSE Bug 1154212
Описание
There is a possible denial of service vulnerability in Action View (Rails) <5.2.2.1, <5.1.6.2, <5.0.7.2, <4.2.11.1 where specially crafted accept headers can cause action view to consume 100% cpu and make the server unresponsive.
Затронутые продукты
SUSE Linux Enterprise Module for Public Cloud 15 SP1:rmt-server-pubcloud-2.3.1-3.3.3
SUSE Linux Enterprise Module for Server Applications 15 SP1:rmt-server-2.3.1-3.3.3
SUSE Linux Enterprise Module for Server Applications 15 SP1:rmt-server-config-2.3.1-3.3.3
Ссылки
- CVE-2019-5419
- SUSE Bug 1129271
- SUSE Bug 1203810