{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"important"},"category":"csaf_security_advisory","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"Security update for cobbler","title":"Title of the patch"},{"category":"description","text":"This update for cobbler fixes the following issues:\n\nUpdate to 3.3.7:\n\n  * Security: Fix issue that allowed anyone to connect to the API\n    as admin (CVE-2024-47533, boo#1231332)\n\n  * bind - Fix bug that prevents cname entries from being\n    generated successfully\n  * Fix build on RHEL9 based distributions (fence-agents-all split)\n  * Fix for Windows systems\n  * Docs: Add missing dependencies for source installation\n  * Fix issue that prevented systems from being synced when the\n    profile was edited\n\nUpdate to 3.3.6:\n\n  * Upstream all openSUSE specific patches that were maintained in Git\n  * Fix rename of items that had uppercase letters\n  * Skip inconsistent collections instead of crashing the daemon\n\n- Update to 3.3.5:\n  * Added collection indicies for UUID's, MAC's, IP addresses and hostnames\n    boo#1219933\n  * Re-added to_dict() caching\n  * Added lazy loading for the daemon (off by default)\n\n- Update to 3.3.4:\n\n  * Added cobbler-tests-containers subpackage\n  * Updated the distro_signatures.json database\n  * The default name for grub2-efi changed to grubx64.efi to match\n    the DHCP template\n\n- Do generate boot menus even if no profiles or systems - only local boot\n- Avoid crashing running buildiso in certain conditions.\n- Fix settings migration schema to work while upgrading on existing running\n  Uyuni and SUSE Manager servers running with old Cobbler settings (boo#1203478)\n- Consider case of 'next_server' being a hostname during migration\n  of Cobbler collections.\n- Fix problem with 'proxy_url_ext' setting being None type.\n- Update v2 to v3 migration script to allow migration of collections\n  that contains settings from Cobbler 2. (boo#1203478)\n- Fix problem for the migration of 'autoinstall' collection attribute.\n- Fix failing Cobbler tests after upgrading to 3.3.3.\n- Fix regression: allow empty string as interface_type value (boo#1203478) \n- Avoid possible override of existing values during migration\n  of collections to 3.0.0 (boo#1206160)\n- Add missing code for previous patch file around boot_loaders migration.\n- Improve Cobbler performance with item cache and threadpool (boo#1205489)\n- Skip collections that are inconsistent instead of crashing (boo#1205749)\n- Items: Fix creation of 'default' NetworkInterface (boo#1206520)\n- S390X systems require their kernel options to have a linebreak at\n  79 characters (boo#1207595)\n- settings-migration-v1-to-v2.sh will now handle paths with whitespace\n  correct\n- Fix renaming Cobbler items (boo#1204900, boo#1209149)\n- Fix cobbler buildiso so that the artifact can be booted by EFI firmware.\n  (boo#1206060)\n- Add input_string_*, input_boolean, input_int functiont to public API\n","title":"Description of the patch"},{"category":"details","text":"openSUSE-2024-382","title":"Patchnames"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"SUSE ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"self","summary":"URL of this CSAF notice","url":"https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_0382-1.json"},{"category":"self","summary":"URL for openSUSE-SU-2024:0382-1","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CGWWFM26ZMG5SCPMDNQQNYHHTROXVX2Q/"},{"category":"self","summary":"E-Mail link for openSUSE-SU-2024:0382-1","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CGWWFM26ZMG5SCPMDNQQNYHHTROXVX2Q/"},{"category":"self","summary":"SUSE Bug 1203478","url":"https://bugzilla.suse.com/1203478"},{"category":"self","summary":"SUSE Bug 1204900","url":"https://bugzilla.suse.com/1204900"},{"category":"self","summary":"SUSE Bug 1205489","url":"https://bugzilla.suse.com/1205489"},{"category":"self","summary":"SUSE Bug 1205749","url":"https://bugzilla.suse.com/1205749"},{"category":"self","summary":"SUSE Bug 1206060","url":"https://bugzilla.suse.com/1206060"},{"category":"self","summary":"SUSE Bug 1206160","url":"https://bugzilla.suse.com/1206160"},{"category":"self","summary":"SUSE Bug 1206520","url":"https://bugzilla.suse.com/1206520"},{"category":"self","summary":"SUSE Bug 1207595","url":"https://bugzilla.suse.com/1207595"},{"category":"self","summary":"SUSE Bug 1209149","url":"https://bugzilla.suse.com/1209149"},{"category":"self","summary":"SUSE Bug 1219933","url":"https://bugzilla.suse.com/1219933"},{"category":"self","summary":"SUSE Bug 1231332","url":"https://bugzilla.suse.com/1231332"},{"category":"self","summary":"SUSE CVE CVE-2024-47533 page","url":"https://www.suse.com/security/cve/CVE-2024-47533/"}],"title":"Security update for cobbler","tracking":{"current_release_date":"2024-11-28T17:32:46Z","generator":{"date":"2024-11-28T17:32:46Z","engine":{"name":"cve-database.git:bin/generate-csaf.pl","version":"1"}},"id":"openSUSE-SU-2024:0382-1","initial_release_date":"2024-11-28T17:32:46Z","revision_history":[{"date":"2024-11-28T17:32:46Z","number":"1","summary":"Current version"}],"status":"final","version":"1"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_version","name":"cobbler-3.3.7-bp155.2.3.2.noarch","product":{"name":"cobbler-3.3.7-bp155.2.3.2.noarch","product_id":"cobbler-3.3.7-bp155.2.3.2.noarch"}},{"category":"product_version","name":"cobbler-tests-3.3.7-bp155.2.3.2.noarch","product":{"name":"cobbler-tests-3.3.7-bp155.2.3.2.noarch","product_id":"cobbler-tests-3.3.7-bp155.2.3.2.noarch"}},{"category":"product_version","name":"cobbler-tests-containers-3.3.7-bp155.2.3.2.noarch","product":{"name":"cobbler-tests-containers-3.3.7-bp155.2.3.2.noarch","product_id":"cobbler-tests-containers-3.3.7-bp155.2.3.2.noarch"}}],"category":"architecture","name":"noarch"},{"branches":[{"category":"product_name","name":"SUSE Package Hub 15 SP5","product":{"name":"SUSE Package Hub 15 SP5","product_id":"SUSE Package Hub 15 SP5"}},{"category":"product_name","name":"openSUSE Leap 15.5","product":{"name":"openSUSE Leap 15.5","product_id":"openSUSE Leap 15.5","product_identification_helper":{"cpe":"cpe:/o:opensuse:leap:15.5"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"cobbler-3.3.7-bp155.2.3.2.noarch as component of SUSE Package Hub 15 SP5","product_id":"SUSE Package Hub 15 SP5:cobbler-3.3.7-bp155.2.3.2.noarch"},"product_reference":"cobbler-3.3.7-bp155.2.3.2.noarch","relates_to_product_reference":"SUSE Package Hub 15 SP5"},{"category":"default_component_of","full_product_name":{"name":"cobbler-tests-3.3.7-bp155.2.3.2.noarch as component of SUSE Package Hub 15 SP5","product_id":"SUSE Package Hub 15 SP5:cobbler-tests-3.3.7-bp155.2.3.2.noarch"},"product_reference":"cobbler-tests-3.3.7-bp155.2.3.2.noarch","relates_to_product_reference":"SUSE Package Hub 15 SP5"},{"category":"default_component_of","full_product_name":{"name":"cobbler-tests-containers-3.3.7-bp155.2.3.2.noarch as component of SUSE Package Hub 15 SP5","product_id":"SUSE Package Hub 15 SP5:cobbler-tests-containers-3.3.7-bp155.2.3.2.noarch"},"product_reference":"cobbler-tests-containers-3.3.7-bp155.2.3.2.noarch","relates_to_product_reference":"SUSE Package Hub 15 SP5"},{"category":"default_component_of","full_product_name":{"name":"cobbler-3.3.7-bp155.2.3.2.noarch as component of openSUSE Leap 15.5","product_id":"openSUSE Leap 15.5:cobbler-3.3.7-bp155.2.3.2.noarch"},"product_reference":"cobbler-3.3.7-bp155.2.3.2.noarch","relates_to_product_reference":"openSUSE Leap 15.5"},{"category":"default_component_of","full_product_name":{"name":"cobbler-tests-3.3.7-bp155.2.3.2.noarch as component of openSUSE Leap 15.5","product_id":"openSUSE Leap 15.5:cobbler-tests-3.3.7-bp155.2.3.2.noarch"},"product_reference":"cobbler-tests-3.3.7-bp155.2.3.2.noarch","relates_to_product_reference":"openSUSE Leap 15.5"},{"category":"default_component_of","full_product_name":{"name":"cobbler-tests-containers-3.3.7-bp155.2.3.2.noarch as component of openSUSE Leap 15.5","product_id":"openSUSE Leap 15.5:cobbler-tests-containers-3.3.7-bp155.2.3.2.noarch"},"product_reference":"cobbler-tests-containers-3.3.7-bp155.2.3.2.noarch","relates_to_product_reference":"openSUSE Leap 15.5"}]},"vulnerabilities":[{"cve":"CVE-2024-47533","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2024-47533"}],"notes":[{"category":"general","text":"Cobbler, a Linux installation server that allows for rapid setup of network installation environments, has an improper authentication vulnerability starting in version 3.0.0 and prior to versions 3.2.3 and 3.3.7. `utils.get_shared_secret()` always returns `-1`, which allows anyone to connect to cobbler XML-RPC as user `''` password `-1` and make any changes. This gives anyone with network access to a cobbler server full control of the server. Versions 3.2.3 and 3.3.7 fix the issue.","title":"CVE description"}],"product_status":{"recommended":["SUSE Package Hub 15 SP5:cobbler-3.3.7-bp155.2.3.2.noarch","SUSE Package Hub 15 SP5:cobbler-tests-3.3.7-bp155.2.3.2.noarch","SUSE Package Hub 15 SP5:cobbler-tests-containers-3.3.7-bp155.2.3.2.noarch","openSUSE Leap 15.5:cobbler-3.3.7-bp155.2.3.2.noarch","openSUSE Leap 15.5:cobbler-tests-3.3.7-bp155.2.3.2.noarch","openSUSE Leap 15.5:cobbler-tests-containers-3.3.7-bp155.2.3.2.noarch"]},"references":[{"category":"external","summary":"CVE-2024-47533","url":"https://www.suse.com/security/cve/CVE-2024-47533"},{"category":"external","summary":"SUSE Bug 1231332 for CVE-2024-47533","url":"https://bugzilla.suse.com/1231332"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Package Hub 15 SP5:cobbler-3.3.7-bp155.2.3.2.noarch","SUSE Package Hub 15 SP5:cobbler-tests-3.3.7-bp155.2.3.2.noarch","SUSE Package Hub 15 SP5:cobbler-tests-containers-3.3.7-bp155.2.3.2.noarch","openSUSE Leap 15.5:cobbler-3.3.7-bp155.2.3.2.noarch","openSUSE Leap 15.5:cobbler-tests-3.3.7-bp155.2.3.2.noarch","openSUSE Leap 15.5:cobbler-tests-containers-3.3.7-bp155.2.3.2.noarch"]}],"scores":[{"cvss_v3":{"baseScore":9.8,"baseSeverity":"CRITICAL","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"products":["SUSE Package Hub 15 SP5:cobbler-3.3.7-bp155.2.3.2.noarch","SUSE Package Hub 15 SP5:cobbler-tests-3.3.7-bp155.2.3.2.noarch","SUSE Package Hub 15 SP5:cobbler-tests-containers-3.3.7-bp155.2.3.2.noarch","openSUSE Leap 15.5:cobbler-3.3.7-bp155.2.3.2.noarch","openSUSE Leap 15.5:cobbler-tests-3.3.7-bp155.2.3.2.noarch","openSUSE Leap 15.5:cobbler-tests-containers-3.3.7-bp155.2.3.2.noarch"]}],"threats":[{"category":"impact","date":"2024-11-28T17:32:46Z","details":"critical"}],"title":"CVE-2024-47533"}]}