Security update for SUSE Studio
SUSE Security Update: Security update for SUSE Studio
This SUSE Studio update fixes the following security and non-security
issues:
* bnc#851903 - Fixed 1.3 stuck on "Importing repositories and
templates" after restoring 1.2 backup
* bnc#808381 - Outdated image types list in API documentation
* bnc#826880 - Misleading error message when adding repo that is
already there
* bnc#825713 - susestudio-bundled-packages is not required by studio
packages
* bnc#870697 - Limit memory used for builds
* bnc#867136 - After sync now appliance build still uses older package
version
* bnc#867745 - If no dhcp, permissions and ssl are not configured
* bnc#824309 - When removing or reinstalling AddOn, sudoers file gets
messy
* bnc#854786 - Security issues in rails (CVE-2013-4491, CVE-2013-6414,
CVE-2013-6415, CVE-2013-6416, CVE-2013-4389)
* bnc#857887 - Session secret in options.yml instead of
options-local.yml
* bnc#858218 - XSS vulnerabilities in will_paginate (CVE-2013-6459)
* bnc#864803 - Rails security issues (CVE-2014-0081 and CVE-2014-0082)
* bnc#852166 - Secret tokens are static as shipped (CVE-2013-3712)
* bnc#866543 - Documentation for updating frozen repositories after
1.2-to-1.3 migration
* bnc#880078 - Fix schema.rb file for ui-server
Security Issues references:
* CVE-2013-4491
* CVE-2013-6414
* CVE-2013-6415
* CVE-2013-6416
* CVE-2013-4389
* CVE-2014-0081
* CVE-2014-0082
* CVE-2013-3712
* CVE-2013-6459
Announcement ID: | SUSE-SU-2014:0734-1 |
Rating: | low |
References: | #808381 #824309 #825713 #826880 #851903 #852166 #854786 #857887 #858218 #864803 #866543 #867136 #867745 #870697 #880078 |
Affected Products: |
An update that solves 9 vulnerabilities and has 6 fixes is now available. It includes one version update.
Description:
This SUSE Studio update fixes the following security and non-security
issues:
* bnc#851903 - Fixed 1.3 stuck on "Importing repositories and
templates" after restoring 1.2 backup
* bnc#808381 - Outdated image types list in API documentation
* bnc#826880 - Misleading error message when adding repo that is
already there
* bnc#825713 - susestudio-bundled-packages is not required by studio
packages
* bnc#870697 - Limit memory used for builds
* bnc#867136 - After sync now appliance build still uses older package
version
* bnc#867745 - If no dhcp, permissions and ssl are not configured
* bnc#824309 - When removing or reinstalling AddOn, sudoers file gets
messy
* bnc#854786 - Security issues in rails (CVE-2013-4491, CVE-2013-6414,
CVE-2013-6415, CVE-2013-6416, CVE-2013-4389)
* bnc#857887 - Session secret in options.yml instead of
options-local.yml
* bnc#858218 - XSS vulnerabilities in will_paginate (CVE-2013-6459)
* bnc#864803 - Rails security issues (CVE-2014-0081 and CVE-2014-0082)
* bnc#852166 - Secret tokens are static as shipped (CVE-2013-3712)
* bnc#866543 - Documentation for updating frozen repositories after
1.2-to-1.3 migration
* bnc#880078 - Fix schema.rb file for ui-server
Security Issues references:
* CVE-2013-4491
* CVE-2013-6414
* CVE-2013-6415
* CVE-2013-6416
* CVE-2013-4389
* CVE-2014-0081
* CVE-2014-0082
* CVE-2013-3712
* CVE-2013-6459
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Studio Onsite 1.3:
zypper in -t patch slestso13-susestudio-137-201404-9308
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Studio Onsite 1.3 (x86_64) [New Version: 1.3.7]:
- susestudio-1.3.7-0.17.1
- susestudio-bundled-packages-1.3.7-0.17.1
- susestudio-common-1.3.7-0.17.1
- susestudio-runner-1.3.7-0.17.1
- susestudio-sid-1.3.7-0.17.1
- susestudio-ui-server-1.3.7-0.17.1
- SUSE Studio Onsite 1.3 (noarch):
- susestudio-admin_en-11.3-0.15.1
- susestudio-admin_en-pdf-11.3-0.15.1
References:
- http://support.novell.com/security/cve/CVE-2013-3712.html
- http://support.novell.com/security/cve/CVE-2013-4389.html
- http://support.novell.com/security/cve/CVE-2013-4491.html
- http://support.novell.com/security/cve/CVE-2013-6414.html
- http://support.novell.com/security/cve/CVE-2013-6415.html
- http://support.novell.com/security/cve/CVE-2013-6416.html
- http://support.novell.com/security/cve/CVE-2013-6459.html
- http://support.novell.com/security/cve/CVE-2014-0081.html
- http://support.novell.com/security/cve/CVE-2014-0082.html
- https://bugzilla.novell.com/808381
- https://bugzilla.novell.com/824309
- https://bugzilla.novell.com/825713
- https://bugzilla.novell.com/826880
- https://bugzilla.novell.com/851903
- https://bugzilla.novell.com/852166
- https://bugzilla.novell.com/854786
- https://bugzilla.novell.com/857887
- https://bugzilla.novell.com/858218
- https://bugzilla.novell.com/864803
- https://bugzilla.novell.com/866543
- https://bugzilla.novell.com/867136
- https://bugzilla.novell.com/867745
- https://bugzilla.novell.com/870697
- https://bugzilla.novell.com/880078
- http://download.suse.com/patch/finder/?keywords=b9000898eb3e19edea1d5eabcff8831a