SUSE: 2022:3338-1 moderate: ardana-ansible, ardana-cobbler, grafana, openstack-heat-templa
Summary
This update for ardana-ansible, ardana-cobbler, grafana, openstack-heat-templates, openstack-murano, python-Django, rabbitmq-server, rubygem-puma fixes the following issues: Security updates included on this update: ardana-ansible, ardana-cobbler, grafana, openstack-heat-templates, openstack-murano, rabbitmq-server: - CVE-2020-1734: Fixed vulnerability where shell was enabled by default in a pipe lookup plugin subprocess. (SOC-11662, bnc#1164139) - CVE-2021-44716: Fixed uncontrolled memory consumption in go's net/http. (bsc#1193597) - CVE-2019-11287: Fixed DoS via "X-Reason" HTTP Header in malicious Erlang format string. (bsc#1157665) grafana: - CVE-2021-39226: Fixed snapshot authentication bypass (bsc#1191454). - CVE-2021-44716: Fixed uncontrolled memory consumption in go's net/http (bsc#1193597). python-Django: - CVE-2022-28346: Fixed vulnerability that could lead to SQL injection in QuerySet.annotate(),aggregate() and extra(). (bsc#1198398) - CVE-2022-34265: Fixed vulnerability that could lead to SQL injection via Trunc(kind) and Extract(lookup_name) arguments. (bsc#1201186) rubygem puma: - CVE-2022-24790: Fixed HTTP request smuggling vulnerability. (bsc#1197818) Additional information about the this update: Changes in ardana-ansible: - Update to version 8.0+git.1660773729.3789a6d: * Mitigate CVE-2020-1734 (SOC-11662) Changes in ardana-cobbler: - Update to version 8.0+git.1660773402.d845a45: * Mitigate CVE-2020-1734 (SOC-11662) Changes in grafana: - Add CVE-2021-39226 patch (bsc#1191454, CVE-2021-39226) * snapshot authentication bypass - Bump Go to 1.16 (bsc#1193597, CVE-2021-44716) * Fix Go net/http: limit growth of header canonicalization cache. Changes in openstack-heat-templates: - Update to version 0.0.0+git.1654529662.75fa04a: * doc: Comment out language option Changes in openstack-murano: - Update to version murano-4.0.2.dev3: * [stable-only] Remove periodic-stable-jobs template Changes in openstack-murano: - Update to version murano-4.0.2.dev3: * [stable-only] Remove periodic-stable-jobs template Changes in rabbitmq-server: - add explanation-format patch to fix CVE-2019-11287 (bsc#1157665) Changes in python-Django: - Rename Django-1.11.29.tar.gz.asc to Django-1.11.29.tar.gz.checksums.txt to avoid source_validator incorrectly trying to use it as a detached signature file for the sources tarball. - Remove unnecessary project.diff file. - Add CVE-2022-28346 patch (bsc#1198398, CVE-2022-28346) * Potential SQL injection in QuerySet.annotate(),aggregate() and extra() - Add CVE-2022-34265 patch (bsc#1201186, CVE-2022-34265) * SQL injection via Trunc(kind) and Extract(lookup_name) arguments Changes in rubygem-puma: - Add CVE-2022-24790: Fixed HTTP request smuggling vulnerability (bsc#1197818). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE OpenStack Cloud Crowbar 8: zypper in -t patch SUSE-OpenStack-Cloud-Crowbar-8-2022-3338=1 - SUSE OpenStack Cloud 8: zypper in -t patch SUSE-OpenStack-Cloud-8-2022-3338=1 - HPE Helion Openstack 8: zypper in -t patch HPE-Helion-OpenStack-8-2022-3338=1 Package List: - SUSE OpenStack Cloud Crowbar 8 (x86_64): grafana-6.7.4-4.23.1 grafana-debuginfo-6.7.4-4.23.1 rabbitmq-server-3.6.16-3.13.1 rabbitmq-server-plugins-3.6.16-3.13.1 ruby2.1-rubygem-puma-2.16.0-3.18.1 ruby2.1-rubygem-puma-debuginfo-2.16.0-3.18.1 rubygem-puma-debugsource-2.16.0-3.18.1 - SUSE OpenStack Cloud Crowbar 8 (noarch): openstack-heat-templates-0.0.0+git.1654529662.75fa04a-3.27.1 openstack-murano-4.0.2~dev3-3.12.1 openstack-murano-api-4.0.2~dev3-3.12.1 openstack-murano-doc-4.0.2~dev3-3.12.1 openstack-murano-engine-4.0.2~dev3-3.12.1 python-Django-1.11.29-3.42.1 python-murano-4.0.2~dev3-3.12.1 - SUSE OpenStack Cloud 8 (noarch): ardana-ansible-8.0+git.1660773729.3789a6d-3.85.1 ardana-cobbler-8.0+git.1660773402.d845a45-3.47.1 openstack-heat-templates-0.0.0+git.1654529662.75fa04a-3.27.1 openstack-murano-4.0.2~dev3-3.12.1 openstack-murano-api-4.0.2~dev3-3.12.1 openstack-murano-doc-4.0.2~dev3-3.12.1 openstack-murano-engine-4.0.2~dev3-3.12.1 python-Django-1.11.29-3.42.1 python-murano-4.0.2~dev3-3.12.1 venv-openstack-heat-x86_64-9.0.8~dev22-12.45.1 venv-openstack-horizon-x86_64-12.0.5~dev6-14.48.1 venv-openstack-murano-x86_64-4.0.2~dev3-12.38.1 - SUSE OpenStack Cloud 8 (x86_64): grafana-6.7.4-4.23.1 grafana-debuginfo-6.7.4-4.23.1 rabbitmq-server-3.6.16-3.13.1 rabbitmq-server-plugins-3.6.16-3.13.1 - HPE Helion Openstack 8 (noarch): ardana-ansible-8.0+git.1660773729.3789a6d-3.85.1 ardana-cobbler-8.0+git.1660773402.d845a45-3.47.1 openstack-heat-templates-0.0.0+git.1654529662.75fa04a-3.27.1 openstack-murano-4.0.2~dev3-3.12.1 openstack-murano-api-4.0.2~dev3-3.12.1 openstack-murano-doc-4.0.2~dev3-3.12.1 openstack-murano-engine-4.0.2~dev3-3.12.1 python-Django-1.11.29-3.42.1 python-murano-4.0.2~dev3-3.12.1 venv-openstack-heat-x86_64-9.0.8~dev22-12.45.1 venv-openstack-horizon-hpe-x86_64-12.0.5~dev6-14.48.1 venv-openstack-murano-x86_64-4.0.2~dev3-12.38.1 - HPE Helion Openstack 8 (x86_64): grafana-6.7.4-4.23.1 grafana-debuginfo-6.7.4-4.23.1 rabbitmq-server-3.6.16-3.13.1 rabbitmq-server-plugins-3.6.16-3.13.1
References
#1157665 #1191454 #1193597 #1197818 #1198398
#1201186 SOC-11662
Cross- CVE-2019-11287 CVE-2020-1734 CVE-2021-39226
CVE-2021-44716 CVE-2022-24790 CVE-2022-28346
CVE-2022-34265
CVSS scores:
CVE-2019-11287 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2019-11287 (SUSE): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2020-1734 (NVD) : 7.4 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L
CVE-2020-1734 (SUSE): 7.4 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L
CVE-2021-39226 (NVD) : 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
CVE-2021-39226 (SUSE): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
CVE-2021-44716 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2021-44716 (SUSE): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-24790 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CVE-2022-24790 (SUSE): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CVE-2022-28346 (NVD) : 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2022-28346 (SUSE): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
CVE-2022-34265 (NVD) : 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2022-34265 (SUSE): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products:
HPE Helion Openstack 8
SUSE OpenStack Cloud 8
SUSE OpenStack Cloud Crowbar 8
https://www.suse.com/security/cve/CVE-2019-11287.html
https://www.suse.com/security/cve/CVE-2020-1734.html
https://www.suse.com/security/cve/CVE-2021-39226.html
https://www.suse.com/security/cve/CVE-2021-44716.html
https://www.suse.com/security/cve/CVE-2022-24790.html
https://www.suse.com/security/cve/CVE-2022-28346.html
https://www.suse.com/security/cve/CVE-2022-34265.html
https://bugzilla.suse.com/1157665
https://bugzilla.suse.com/1191454
https://bugzilla.suse.com/1193597
https://bugzilla.suse.com/1197818
https://bugzilla.suse.com/1198398
https://bugzilla.suse.com/1201186