drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Preisgabe von Informationen in SUSE Manager Client Tools
| Name: |
Preisgabe von Informationen in SUSE Manager Client Tools |
|
| ID: |
SUSE-SU-2025:0529-1 |
|
| Distribution: |
SUSE |
|
| Plattformen: |
SUSE Manager Client Tools for Debian 12 |
|
| Datum: |
Fr, 14. Februar 2025, 17:06 |
|
| Referenzen: |
https://www.cve.org/CVERecord?id=CVE-2024-22037 |
|
| Applikationen: |
SUSE Manager Client Tools |
|
Originalnachricht |
--===============9129141430608779849== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit
# Security update for SUSE Manager Client Tools MU 5.0.3
Announcement ID: SUSE-SU-2025:0529-1 Release Date: 2025-02-14T07:19:47Z Rating: moderate References:
* bsc#1229079 * bsc#1229104 * bsc#1231497 * bsc#1231568 * bsc#1231759 * bsc#1232575 * bsc#1232769 * bsc#1232817 * bsc#1233202 * bsc#1233279 * bsc#1233630 * bsc#1233660 * bsc#1234123 * jsc#MSQA-914
Cross-References:
* CVE-2024-22037
CVSS scores:
* CVE-2024-22037 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:L/SI:L/SA:L * CVE-2024-22037 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-22037 ( NVD ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-22037 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Affected Products:
* SUSE Manager Client Tools for Debian 12
An update that solves one vulnerability, contains one feature and has 12 security fixes can now be installed.
## Description:
This update fixes the following issues:
spacecmd was updated to version 5.0.11-0:
* Updated translation strings
uyuni-tools was updated from version 0.1.23-0 to 0.1.27-0:
* Security issues fixed: * CVE-2024-22037: Use podman secret to store the database credentials (bsc#1231497) * Other changes and bugs fixed: * Version 0.1.27-0 * Bump the default image tag to 5.0.3 * IsInstalled function fix * Run systemctl daemon-reload after changing the container image config (bsc#1233279) * Coco-replicas-upgrade * Persist search server indexes (bsc#1231759) * Sync deletes files during migration (bsc#1233660) * Ignore coco and hub images when applying PTF if they are not ailable (bsc#1229079) * Add --registry back to mgrpxy (bsc#1233202) * Only add java.hostname on migrated server if not present * Consider the configuration file to detect the coco or hub api images should be pulled (bsc#1229104) * Only raise an error if cloudguestregistryauth fails for PAYG (bsc#1233630) * Add registry.suse.com login to mgradm upgrade podman list (bsc#1234123) * Version 0.1.26-0 * Ignore all zypper caches during migration (bsc#1232769) * Use the uyuni network for all podman containers (bsc#1232817) * Version 0.1.25-0 * Don't migrate enabled systemd services, recreate them (bsc#1232575) * Version 0.1.24-0 * Redact JSESSIONID and pxt-session-cookie values from logs and console output (bsc#1231568)
## Special Instructions and Notes:
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product:
* SUSE Manager Client Tools for Debian 12 zypper in -t patch SUSE-Debian-12-CLIENT-TOOLS-x86_64-2025-529=1
## Package List:
* SUSE Manager Client Tools for Debian 12 (all) * mgrctl-fish-completion-0.1.28-2.16.1 * mgrctl-bash-completion-0.1.28-2.16.1 * spacecmd-5.0.11-3.26.1 * mgrctl-zsh-completion-0.1.28-2.16.1 * SUSE Manager Client Tools for Debian 12 (amd64) * mgrctl-0.1.28-2.16.1
## References:
* https://www.suse.com/security/cve/CVE-2024-22037.html * https://bugzilla.suse.com/show_bug.cgi?id=1229079 * https://bugzilla.suse.com/show_bug.cgi?id=1229104 * https://bugzilla.suse.com/show_bug.cgi?id=1231497 * https://bugzilla.suse.com/show_bug.cgi?id=1231568 * https://bugzilla.suse.com/show_bug.cgi?id=1231759 * https://bugzilla.suse.com/show_bug.cgi?id=1232575 * https://bugzilla.suse.com/show_bug.cgi?id=1232769 * https://bugzilla.suse.com/show_bug.cgi?id=1232817 * https://bugzilla.suse.com/show_bug.cgi?id=1233202 * https://bugzilla.suse.com/show_bug.cgi?id=1233279 * https://bugzilla.suse.com/show_bug.cgi?id=1233630 * https://bugzilla.suse.com/show_bug.cgi?id=1233660 * https://bugzilla.suse.com/show_bug.cgi?id=1234123 * https://jira.suse.com/browse/MSQA-914
--===============9129141430608779849== Content-Type: text/html; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit
<div class="container"> <h1>Security update for SUSE Manager Client Tools MU 5.0.3</h1>
<table class="table table-striped table-bordered"> <tbody> <tr> <th>Announcement ID:</th> <td>SUSE-SU-2025:0529-1</td> </tr> <tr> <th>Release Date:</th> <td>2025-02-14T07:19:47Z</td> </tr> <tr> <th>Rating:</th> <td>moderate</td> </tr> <tr> <th>References:</th> <td> <ul> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229079">bsc#1229079</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229104">bsc#1229104</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1231497">bsc#1231497</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1231568">bsc#1231568</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1231759">bsc#1231759</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1232575">bsc#1232575</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1232769">bsc#1232769</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1232817">bsc#1232817</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1233202">bsc#1233202</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1233279">bsc#1233279</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1233630">bsc#1233630</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1233660">bsc#1233660</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234123">bsc#1234123</a> </li> <li style="display: inline;"> <a href="https://jira.suse.com/browse/MSQA-914">jsc#MSQA-914</a> </li> </ul> </td> </tr> <tr> <th> Cross-References: </th> <td> <ul> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-22037.html">CVE-2024-22037</a> </li> </ul> </td> </tr> <tr> <th>CVSS scores:</th> <td> <ul class="list-group"> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-22037</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.7</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:L/SI:L/SA:L</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-22037</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-22037</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.7</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-22037</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span> </li> </ul> </td> </tr> <tr> <th>Affected Products:</th> <td> <ul class="list-group"> <li class="list-group-item">SUSE Manager Client Tools for Debian 12</li> </ul> </td> </tr> </tbody> </table>
<p>An update that solves one vulnerability, contains one feature and has 12 security fixes can now be installed.</p>
<h2>Description:</h2> <p>This update fixes the following issues:</p> <p>spacecmd was updated to version 5.0.11-0:</p> <ul> <li>Updated translation strings</li> </ul> <p>uyuni-tools was updated from version 0.1.23-0 to 0.1.27-0:</p> <ul> <li>Security issues fixed:</li> <li>CVE-2024-22037: Use podman secret to store the database credentials (bsc#1231497)</li> <li>Other changes and bugs fixed:</li> <li>Version 0.1.27-0<ul> <li>Bump the default image tag to 5.0.3</li> <li>IsInstalled function fix</li> <li>Run systemctl daemon-reload after changing the container image config (bsc#1233279)</li> <li>Coco-replicas-upgrade</li> <li>Persist search server indexes (bsc#1231759)</li> <li>Sync deletes files during migration (bsc#1233660)</li> <li>Ignore coco and hub images when applying PTF if they are not ailable (bsc#1229079)</li> <li>Add --registry back to mgrpxy (bsc#1233202)</li> <li>Only add java.hostname on migrated server if not present</li> <li>Consider the configuration file to detect the coco or hub api images should be pulled (bsc#1229104)</li> <li>Only raise an error if cloudguestregistryauth fails for PAYG (bsc#1233630)</li> <li>Add registry.suse.com login to mgradm upgrade podman list (bsc#1234123)</li> </ul> </li> <li>Version 0.1.26-0<ul> <li>Ignore all zypper caches during migration (bsc#1232769)</li> <li>Use the uyuni network for all podman containers (bsc#1232817)</li> </ul> </li> <li>Version 0.1.25-0<ul> <li>Don't migrate enabled systemd services, recreate them (bsc#1232575)</li> </ul> </li> <li>Version 0.1.24-0<ul> <li>Redact JSESSIONID and pxt-session-cookie values from logs and console output (bsc#1231568)</li> </ul> </li> </ul>
<h2>Special Instructions and Notes:</h2> <ul> </ul>
<h2>Patch Instructions:</h2> <p> To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch".<br/>
Alternatively you can run the command listed for your product: </p> <ul class="list-group"> <li class="list-group-item"> SUSE Manager Client Tools for Debian 12 <br/> <code>zypper in -t patch SUSE-Debian-12-CLIENT-TOOLS-x86_64-2025-529=1</code> </li> </ul>
<h2>Package List:</h2> <ul> <li> SUSE Manager Client Tools for Debian 12 (all) <ul> <li>mgrctl-fish-completion-0.1.28-2.16.1</li> <li>mgrctl-bash-completion-0.1.28-2.16.1</li> <li>spacecmd-5.0.11-3.26.1</li> <li>mgrctl-zsh-completion-0.1.28-2.16.1</li> </ul> </li> <li> SUSE Manager Client Tools for Debian 12 (amd64) <ul> <li>mgrctl-0.1.28-2.16.1</li> </ul> </li> </ul>
<h2>References:</h2> <ul> <li> <a href="https://www.suse.com/security/cve/CVE-2024-22037.html">https://www.suse.com/security/cve/CVE-2024-22037.html</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229079">https://bugzilla.suse.com/show_bug.cgi?id=1229079</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1229104">https://bugzilla.suse.com/show_bug.cgi?id=1229104</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1231497">https://bugzilla.suse.com/show_bug.cgi?id=1231497</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1231568">https://bugzilla.suse.com/show_bug.cgi?id=1231568</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1231759">https://bugzilla.suse.com/show_bug.cgi?id=1231759</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1232575">https://bugzilla.suse.com/show_bug.cgi?id=1232575</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1232769">https://bugzilla.suse.com/show_bug.cgi?id=1232769</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1232817">https://bugzilla.suse.com/show_bug.cgi?id=1232817</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1233202">https://bugzilla.suse.com/show_bug.cgi?id=1233202</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1233279">https://bugzilla.suse.com/show_bug.cgi?id=1233279</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1233630">https://bugzilla.suse.com/show_bug.cgi?id=1233630</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1233660">https://bugzilla.suse.com/show_bug.cgi?id=1233660</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234123">https://bugzilla.suse.com/show_bug.cgi?id=1234123</a> </li> <li> <a href="https://jira.suse.com/browse/MSQA-914">https://jira.suse.com/browse/MSQA-914</a> </li> </ul> </div>
--===============9129141430608779849==--
|
|
|
|