Jump to content
Compatible Support Forums
Sign in to follow this  
news

[security-announce] SUSE-SU-2011:1324-1: critical: Security update for SUSE Studio Onsite 1.2 and kiwi

Recommended Posts

SUSE Security Update: Security update for SUSE Studio Onsite 1.2 and kiwi

______________________________________________________________________________

 

Announcement ID: SUSE-SU-2011:1324-1

Rating: critical

References: #705694 #707637 #709572 #710392 #710403 #714755

#716992 #725445 #725466 #725706 #728934 #729204

#729273 #729315 #729675

Cross-References: CVE-2011-2225 CVE-2011-2226 CVE-2011-3180

CVE-2011-4192 CVE-2011-4193 CVE-2011-4195

 

Affected Products:

SUSE Studio Onsite 1.2

SUSE Studio Extension for System z 1.2

______________________________________________________________________________

 

An update that solves 6 vulnerabilities and has 9 fixes is

now available. It includes two new package versions.

 

Description:

 

 

Fix for several vulnerabilities in SUSE Studio Onsite 1.2

and kiwi:

 

* CVE-2011-2225: The path of overlay files was not

escaped which allowed shell meta character injection.

* CVE-2011-2226: By using an untrusted software

repository a user becomes vulnerable to a XSS attack when

displaying pattern files (clicking "All patterns" in the

software tab).

* CVE-2011-3180: The path of overlay files was not

escaped which allowed shell meta character injection via

the chown(1) command-line. (kiwi)

* CVE-2011-4195: The image name was not escaped

properly and can be used in conjunction with other

applications to execute arbitrary shell commands. (kiwi)

* CVE-2011-4193: XSS vulnerability in "overlay files"

tab can be used to execute arbitrary JavaScript code while

cloning an appliance from an untrusted source.

* CVE-2011-4192: Arbitrary shell command injection in

conjunction with Studio by using double quotes in

kiwi_oemtitle of .profile. (kiwi)

 

In addition, the following non-security fixes were added:

 

* Added SLE SDK repos to SLES-for-VMware templates

* do not overwrite rmds.conf

 

Security Issue references:

 

* CVE-2011-2225

 

* CVE-2011-2226

 

* CVE-2011-3180

 

* CVE-2011-4195

 

* CVE-2011-4193

 

* CVE-2011-4192

 

 

Indications:

 

Please update.

 

Patch Instructions:

 

To install this SUSE Security Update use YaST online_update.

Alternatively you can run the command listed for your product:

 

- SUSE Studio Onsite 1.2:

 

zypper in -t patch slestso12-susestudio-201112-5535

 

- SUSE Studio Extension for System z 1.2:

 

zypper in -t patch slestso12-susestudio-201112-5535

 

To bring your system up-to-date, use "zypper patch".

 

 

Package List:

 

- SUSE Studio Onsite 1.2 (x86_64) [New Version: 1.2.1 and 4.85.1]:

 

kiwi4-4.85.1-0.22.9

kiwi4-desc-isoboot-4.85.1-0.22.9

kiwi4-desc-netboot-4.85.1-0.22.9

kiwi4-desc-oemboot-4.85.1-0.22.9

kiwi4-desc-vmxboot-4.85.1-0.22.9

kiwi4-doc-4.85.1-0.22.9

kiwi4-tools-4.85.1-0.22.9

susestudio-1.2.1-0.26.1

susestudio-clicfs-1.2.1-0.26.1

susestudio-common-1.2.1-0.26.1

susestudio-image-helpers-1.2.1-0.3.3

susestudio-parted-1.2.1-0.26.1

susestudio-rmds-1.2.1-0.26.1

susestudio-runner-1.2.1-0.26.1

susestudio-squashfs-1.2.1-0.26.1

susestudio-thoth-1.2.1-0.26.1

susestudio-ui-server-1.2.1-0.26.1

 

- SUSE Studio Extension for System z 1.2 (s390x) [New Version: 1.2.1 and 4.85.1]:

 

kiwi4-4.85.1-0.22.9

kiwi4-desc-oemboot-4.85.1-0.22.9

kiwi4-desc-vmxboot-4.85.1-0.22.9

kiwi4-tools-4.85.1-0.22.9

susestudio-1.2.1-0.26.1

susestudio-common-1.2.1-0.26.1

susestudio-image-helpers-1.2.1-0.3.3

susestudio-runner-1.2.1-0.26.1

susestudio-ui-server-1.2.1-0.26.1

 

 

References:

 

http://support.novell.com/security/cve/CVE-2011-2225.html

http://support.novell.com/security/cve/CVE-2011-2226.html

http://support.novell.com/security/cve/CVE-2011-3180.html

http://support.novell.com/security/cve/CVE-2011-4192.html

http://support.novell.com/security/cve/CVE-2011-4193.html

http://support.novell.com/security/cve/CVE-2011-4195.html

https://bugzilla.novell.com/705694

https://bugzilla.novell.com/707637

https://bugzilla.novell.com/709572

https://bugzilla.novell.com/710392

https://bugzilla.novell.com/710403

https://bugzilla.novell.com/714755

https://bugzilla.novell.com/716992

https://bugzilla.novell.com/725445

https://bugzilla.novell.com/725466

https://bugzilla.novell.com/725706

https://bugzilla.novell.com/728934

https://bugzilla.novell.com/729204

https://bugzilla.novell.com/729273

https://bugzilla.novell.com/729315

https://bugzilla.novell.com/729675

http://download.novell.com/patch/finder/?keywords=cea13b60fcb37edad0cdb1e1952837e8

 

--

To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org

For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org

 

 

 

Share this post


Link to post

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now
Sign in to follow this  

×