openSUSE-SU-2022:0062-1: important: Security update for cobbler

openSUSE Security Update: Security update for cobbler ______________________________________________________________________________ Announcement ID: openSUSE-SU-2022:0062-1 Rating: important References: #1184561 #1185679 #1186124 #1189458 #1193671 #1193673 #1193675 #1193676 #1193678 #1194333 #1195906 #1195918 Cross-References: CVE-2021-40323 CVE-2021-40324 CVE-2021-40325 CVE-2021-45082 CVE-2021-45083 CVE-2021-45942 CVSS scores: CVE-2021-40323 (SUSE): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N CVE-2021-40324 (SUSE): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H CVE-2021-40325 (SUSE): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N CVE-2021-45082 (SUSE): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H CVE-2021-45083 (NVD) : 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N CVE-2021-45083 (SUSE): 8.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N CVE-2021-45942 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVE-2021-45942 (SUSE): 6.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H Affected Products: openSUSE Backports SLE-15-SP3 openSUSE Leap 15.3 ______________________________________________________________________________ An update that solves 6 vulnerabilities and has 6 fixes is now available. Description: This update for cobbler fixes the following issues: - CVE-2021-45083: Fixed unsafe permissions on sensitive files (bsc#1193671). - CVE-2021-45082: Fixed incomplete template sanitation (bsc#1193678). - CVE-2021-40323, CVE-2021-40324, CVE-2021-40325: Fixed Remote Code Execution in the XMLRPC API which additionally allowed arbitrary file read and write as root (boo#1189458). The following non-security bugs were fixed: - Fix issues with installation module logging and validation (boo#1195918) - Move configuration files ownership to apache (boo#1195906) - Remove hardcoded test credentials (boo#1193673) - Prevent log pollution (boo#1193675) - Missing sanity check on MongoDB configuration file (boo#1193676) - Avoid traceback when building tftp files for ppc arch system when boot_loader is not set (boo#1185679) - Prevent some race conditions when writting tftpboot files and the destination directory is not existing (boo#1186124) - Fix trail stripping in case of using UTF symbols (boo#1184561) Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or “zypper patch”. Alternatively you can run the command listed for your product: - openSUSE Leap 15.3: zypper in -t patch openSUSE-SLE-15.3-2022-62=1 - openSUSE Backports SLE-15-SP3: zypper in -t patch openSUSE-2022-62=1 Package List: - openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64): libIlmImf-2_2-23-2.2.1-3.41.1 libIlmImf-2_2-23-debuginfo-2.2.1-3.41.1 libIlmImfUtil-2_2-23-2.2.1-3.41.1 libIlmImfUtil-2_2-23-debuginfo-2.2.1-3.41.1 openexr-2.2.1-3.41.1 openexr-debuginfo-2.2.1-3.41.1 openexr-debugsource-2.2.1-3.41.1 openexr-devel-2.2.1-3.41.1 openexr-doc-2.2.1-3.41.1 - openSUSE Leap 15.3 (x86_64): libIlmImf-2_2-23-32bit-2.2.1-3.41.1 libIlmImf-2_2-23-32bit-debuginfo-2.2.1-3.41.1 libIlmImfUtil-2_2-23-32bit-2.2.1-3.41.1 libIlmImfUtil-2_2-23-32bit-debuginfo-2.2.1-3.41.1 - openSUSE Backports SLE-15-SP3 (noarch): cobbler-3.1.2-bp153.2.3.1 cobbler-tests-3.1.2-bp153.2.3.1 cobbler-web-3.1.2-bp153.2.3.1 References: https://www.suse.com/security/cve/CVE-2021-40323.html https://www.suse.com/security/cve/CVE-2021-40324.html https://www.suse.com/security/cve/CVE-2021-40325.html https://www.suse.com/security/cve/CVE-2021-45082.html https://www.suse.com/security/cve/CVE-2021-45083.html https://www.suse.com/security/cve/CVE-2021-45942.html https://bugzilla.suse.com/1184561 https://bugzilla.suse.com/1185679 https://bugzilla.suse.com/1186124 https://bugzilla.suse.com/1189458 https://bugzilla.suse.com/1193671 https://bugzilla.suse.com/1193673 https://bugzilla.suse.com/1193675 https://bugzilla.suse.com/1193676 https://bugzilla.suse.com/1193678 https://bugzilla.suse.com/1194333 https://bugzilla.suse.com/1195906 https://bugzilla.suse.com/1195918

More…