Описание
Security update for SUSE Manager Client Tools
This update fixes the following issues:
golang-github-prometheus-prometheus:
-
Security issues fixed:
- CVE-2024-6104: Update go-retryablehttp to version 0.7.7 (bsc#1227038)
- CVE-2023-45142: Updated otelhttp to version 0.46.1 (bsc#1228556)
-
Require Go > 1.20 for building
-
Migrate from
disabled
tomanual
service mode -
Update to 2.45.6 (jsc#PED-3577):
- Security fixes in dependencies
-
Update to 2.45.5:
- [BUGFIX] tsdb/agent: ensure that new series get written to WAL on rollback.
- [BUGFIX] Remote write: Avoid a race condition when applying configuration.
-
Update to 2.45.4:
- [BUGFIX] Remote read: Release querier resources before encoding the results.
-
Update to 2.45.3:
- [BUGFIX] TSDB: Remove double memory snapshot on shutdown.
-
Update to 2.45.2:
- [BUGFIX] TSDB: Fix PostingsForMatchers race with creating new series.
-
Update to 2.45.1:
- [ENHANCEMENT] Hetzner SD: Support larger ID's that will be used by Hetzner in September.
- [BUGFIX] Linode SD: Cast InstanceSpec values to int64 to avoid overflows on 386 architecture.
- [BUGFIX] TSDB: Handle TOC parsing failures.
rhnlib:
- Version 5.0.4-0
- Add the old TLS code for very old traditional clients still on python 2.7 (bsc#1228198)
spacecmd:
- Version 5.0.9-0
- Update translation strings
uyuni-tools:
- Version 0.1.21-0
- mgrpxy: Fix typo on Systemd template
- Version 0.1.20-0
- Update the push tag to 5.0.1
- mgrpxy: expose port on IPv6 network (bsc#1227951)
- Version 0.1.19-0
- Skip updating Tomcat remote debug if conf file is not present
- Version 0.1.18-0
- Setup Confidential Computing container during migration (bsc#1227588)
- Add the /etc/uyuni/uyuni-tools.yaml path to the config help
- Split systemd config files to not loose configuration at upgrade (bsc#1227718)
- Use the same logic for image computation in mgradm and mgrpxy (bsc#1228026)
- Allow building with different Helm and container default registry paths (bsc#1226191)
- Fix recursion in mgradm upgrade podman list --help
- Setup hub xmlrpc API service in migration to Podman (bsc#1227588)
- Setup disabled hub xmlrpc API service in all cases (bsc#1227584)
- Clean the inspection code to make it faster
- Properly detect IPv6 enabled on Podman network (bsc#1224349)
- Fix the log file path generation
- Write scripts output to uyuni-tools.log file
- Add uyuni-hubxml-rpc to the list of values in mgradm scale --help
- Use path in mgradm support sql file input (bsc#1227505)
- On Ubuntu build with go1.21 instead of go1.20
- Enforce Cobbler setup (bsc#1226847)
- Expose port on IPv6 network (bsc#1227951)
- show output of podman image search --list-tags command
- Implement mgrpxy support config command
- During migration, ignore /etc/sysconfig/tomcat and /etc/tomcat/tomcat.conf (bsc#1228183)
- During migration, remove java.annotation,com.sun.xml.bind and UseConcMarkSweepGC settings
- Disable node exporter port for Kubernetes
- Fix start, stop and restart in Kubernetes
- Increase start timeout in Kubernetes
- Fix traefik query
- Fix password entry usability (bsc#1226437)
- Add --prepare option to migrate command
- Fix random error during installation of CA certificate (bsc#1227245)
- Clarify and fix distro name guessing when not provided (bsc#1226284)
- Replace not working Fatal error by plain error return (bsc#1220136)
- Allow server installation with preexisting storage volumes
- Do not report error when purging mounted volume (bsc#1225349)
- Preserve PAGER settings from the host for interactive sql usage (bsc#1226914)
- Add mgrpxy command to clear the Squid cache
- Use local images for Confidential Computing and Hub containers (bsc#1227586)
- Version 0.1.17-0
- Allow GPG files to be loaded from the local file (bsc#1227195)
- Version 0.1.16-0
- Prefer local images in all migration steps (bsc#1227244)
- Version 0.1.15-0
- Define --registry flag behaviour (bsc#1226793)
- Version 0.1.14-0
- Do not rely on hardcoded registry, remove any FQDN
- Version 0.1.13-0
- Fix mgradm support config tarball creation (bsc#1226759)
- Version 0.1.12-0
- Detection of k8s on Proxy was wrongly influenced by Server setting
Список пакетов
SUSE Manager Client Tools 15
SUSE Manager Client Tools for SLE Micro 5
openSUSE Leap 15.5
openSUSE Leap 15.6
Ссылки
- Link for SUSE-SU-2024:3267-1
- E-Mail link for SUSE-SU-2024:3267-1
- SUSE Security Ratings
- SUSE Bug 1220136
- SUSE Bug 1224349
- SUSE Bug 1225349
- SUSE Bug 1226191
- SUSE Bug 1226284
- SUSE Bug 1226437
- SUSE Bug 1226759
- SUSE Bug 1226793
- SUSE Bug 1226847
- SUSE Bug 1226914
- SUSE Bug 1227038
- SUSE Bug 1227195
- SUSE Bug 1227244
- SUSE Bug 1227245
- SUSE Bug 1227505
- SUSE Bug 1227584
- SUSE Bug 1227586
Описание
OpenTelemetry-Go Contrib is a collection of third-party packages for OpenTelemetry-Go. A handler wrapper out of the box adds labels `http.user_agent` and `http.method` that have unbound cardinality. It leads to the server's potential memory exhaustion when many malicious requests are sent to it. HTTP header User-Agent or HTTP method for requests can be easily set by an attacker to be random and long. The library internally uses `httpconv.ServerRequest` that records every value for HTTP `method` and `User-Agent`. In order to be affected, a program has to use the `otelhttp.NewHandler` wrapper and not filter any unknown HTTP methods or User agents on the level of CDN, LB, previous middleware, etc. Version 0.44.0 fixed this issue when the values collected for attribute `http.request.method` were changed to be restricted to a set of well-known values and other high cardinality attributes were removed. As a workaround to stop being affected, `otelhttp.WithFilter()` can be used, but it requires manual careful configuration to not log certain requests entirely. For convenience and safe usage of this library, it should by default mark with the label `unknown` non-standard HTTP methods and User agents to show that such requests were made but do not increase cardinality. In case someone wants to stay with the current behavior, library API should allow to enable it.
Затронутые продукты
Ссылки
- CVE-2023-45142
- SUSE Bug 1228553
Описание
go-retryablehttp prior to 0.7.7 did not sanitize urls when writing them to its log file. This could lead to go-retryablehttp writing sensitive HTTP basic auth credentials to its log file. This vulnerability, CVE-2024-6104, was fixed in go-retryablehttp 0.7.7.
Затронутые продукты
Ссылки
- CVE-2024-6104
- SUSE Bug 1227024