Login
Newsletter
Werbung

Sicherheit: Zwei Probleme in rmt-server
Aktuelle Meldungen Distributionen
Name: Zwei Probleme in rmt-server
ID: SUSE-SU-2019:1381-1
Distribution: SUSE
Plattformen: SUSE Linux Enterprise Module for Server Applications 15
Datum: Do, 30. Mai 2019, 12:28
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11068
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5419
Applikationen: RMT

Originalnachricht


SUSE Security Update: Security update for rmt-server
______________________________________________________________________________

Announcement ID: SUSE-SU-2019:1381-1
Rating: important
References: #1107806 #1117722 #1118745 #1125770 #1128858
#1129271 #1129392 #1132160 #1132690 #1134190
#1134428 #1135222
Cross-References: CVE-2019-11068 CVE-2019-5419
Affected Products:
SUSE Linux Enterprise Module for Server Applications 15
______________________________________________________________________________

An update that solves two vulnerabilities and has 10 fixes
is now available.

Description:

This update for rmt-server to version 2.1.4 fixes the following issues:

- Fix duplicate nginx location in rmt-server-pubcloud (bsc#1135222)
- Mirror additional repos that were enabled during mirroring (bsc#1132690)
- Make service IDs consistent across different RMT instances (bsc#1134428)
- Make SMT data import scripts faster (bsc#1134190)
- Fix incorrect triggering of registration sharing (bsc#1129392)
- Fix license mirroring issue in some non-SUSE repositories (bsc#1128858)
- Set CURLOPT_LOW_SPEED_LIMIT to prevent downloads from getting stuck
(bsc#1107806)
- Truncate the RMT lockfile when writing a new PID (bsc#1125770)
- Fix missing trailing slashes on custom repository import from SMT
(bsc#1118745)
- Zypper authentication plugin (fate#326629)
- Instance verification plugin in rmt-server-pubcloud (fate#326629)
- Update dependencies to fix vulnerabilities in rails (CVE-2019-5419,
bsc#1129271) and nokogiri (CVE-2019-11068, bsc#1132160)
- Allow RMT registration to work under HTTP as well as HTTPS.
- Offline migration from SLE 15 to SLE 15 SP1 will add Python2 module
- Online migrations will automatically add additional modules to the
client systems depending on the base product
- Supply log severity to journald
- Breaking Change: Added headers to generated CSV files


Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- SUSE Linux Enterprise Module for Server Applications 15:

zypper in -t patch SUSE-SLE-Module-Server-Applications-15-2019-1381=1



Package List:

- SUSE Linux Enterprise Module for Server Applications 15 (aarch64 ppc64le
s390x x86_64):

rmt-server-2.1.4-3.17.1
rmt-server-debuginfo-2.1.4-3.17.1


References:

https://www.suse.com/security/cve/CVE-2019-11068.html
https://www.suse.com/security/cve/CVE-2019-5419.html
https://bugzilla.suse.com/1107806
https://bugzilla.suse.com/1117722
https://bugzilla.suse.com/1118745
https://bugzilla.suse.com/1125770
https://bugzilla.suse.com/1128858
https://bugzilla.suse.com/1129271
https://bugzilla.suse.com/1129392
https://bugzilla.suse.com/1132160
https://bugzilla.suse.com/1132690
https://bugzilla.suse.com/1134190
https://bugzilla.suse.com/1134428
https://bugzilla.suse.com/1135222

_______________________________________________
sle-security-updates mailing list
sle-security-updates@lists.suse.com
http://lists.suse.com/mailman/listinfo/sle-security-updates
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung