SUSE-SU-2025:20224-1
Vulnerability from csaf_suse - Published: 2025-02-20 12:41 - Updated: 2025-02-20 12:41Summary
Security update for cloud-regionsrv-client, python-toml
Notes
Title of the patch
Security update for cloud-regionsrv-client, python-toml
Description of the patch
This update for cloud-regionsrv-client, python-toml contains the following fixes:
cloud-regionsrv-client:
- Update to 10.3.11 (bsc#1234050)
+ Send registration code for the extensions, not only base product
- Update to 10.3.9: (bsc#1234050)
+ Send registration code for the extensions, not only base product
- Update to 10.3.8: (bsc#1233333)
+ Fix the package requirements for cloud-regionsrv-client
+ Follow changes to suseconnect error reporting from stdout to stderr
- Update to 10.3.7: (bsc#1232770)
+ Fix the product triplet for LTSS, it is always SLES-LTSS, not
$BASEPRODUCT-LTSS
- Update to 10.3.6: (jsc#PCT-471, bsc#1230615)
+ Fix sudo setup
~ permissions cloudguestregistryauth
~ directory ownership /etc/sudoers.d
+ spec file
~ Remove traces of registry related entries on SLE 12
+ Forward port
~ fix for sles12 disable registry
~ fix for sles12 no trans_update
+ Deregister non free extensions at registercloudguest --clean
+ Fix registry cleanup at registercloudguest --clean, don't remove files
+ Prevent duplicate search entries in registry setup
- Update EC2 plugin to 1.0.5
+ Switch to using the region endpoint from IMDS to determine the region
instead of deriving the data from the availability zone
- Update to 10.3.5:
+ Update spec file to build in all code streams and have proper dependencies.
- Update to 10.3.4:
+ Modify the message when network access over a specific IP version does
not work. This is an informational message and should not look like
an error
+ Inform the user that LTSS registration takes a little longer
+ fix for sles12 no transactional update:
+ SLE 12 family has no products with transactional-update we do not
need to look for this condition
- From 10.3.3: (bsc#1229472)
+ Handle changes in process structure to properly identify the running
zypper parent process and only check for 1 PID
- From 10.3.2:
+ Remove rgnsrv-clnt-fix-docker-setup patch included upstream
- From 10.3.1: (jsc#PCT-400)
+ Add support for LTSS registration
+ Add fix for sles12 disable registry issue:
~ No container support in SLE 12
- Add fix for docker setup: (bsc#1229137)
+ The entry for the update infrastructure registry mirror was written
incorrectly causing docker daemon startup to fail.
- Update to version 10.3.0: (bsc#1227308, bsc#1222985)
+ Add support for sidecar registry
Podman and rootless Docker support to set up the necessary
configuration for the container engines to run as defined
+ Add running command as root through sudoers file
python-toml:
- Includes python311-toml as dependency for cloud-regionsrv-client
Patchnames
SUSE-SLE-Micro-6.1-18
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for cloud-regionsrv-client, python-toml",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for cloud-regionsrv-client, python-toml contains the following fixes:\n\ncloud-regionsrv-client: \n- Update to 10.3.11 (bsc#1234050)\n + Send registration code for the extensions, not only base product\n\n- Update to 10.3.9: (bsc#1234050)\n + Send registration code for the extensions, not only base product\n\n- Update to 10.3.8: (bsc#1233333)\n + Fix the package requirements for cloud-regionsrv-client\n + Follow changes to suseconnect error reporting from stdout to stderr\n\n- Update to 10.3.7: (bsc#1232770)\n + Fix the product triplet for LTSS, it is always SLES-LTSS, not\n $BASEPRODUCT-LTSS\n\n- Update to 10.3.6: (jsc#PCT-471, bsc#1230615)\n + Fix sudo setup\n ~ permissions cloudguestregistryauth\n ~ directory ownership /etc/sudoers.d\n + spec file\n ~ Remove traces of registry related entries on SLE 12\n + Forward port\n ~ fix for sles12 disable registry\n ~ fix for sles12 no trans_update\n + Deregister non free extensions at registercloudguest --clean\n + Fix registry cleanup at registercloudguest --clean, don\u0027t remove files\n + Prevent duplicate search entries in registry setup\n- Update EC2 plugin to 1.0.5\n + Switch to using the region endpoint from IMDS to determine the region\n instead of deriving the data from the availability zone\n\n- Update to 10.3.5:\n + Update spec file to build in all code streams and have proper dependencies.\n\n- Update to 10.3.4:\n + Modify the message when network access over a specific IP version does\n not work. This is an informational message and should not look like\n an error\n + Inform the user that LTSS registration takes a little longer\n + fix for sles12 no transactional update:\n + SLE 12 family has no products with transactional-update we do not\n need to look for this condition\n- From 10.3.3: (bsc#1229472)\n + Handle changes in process structure to properly identify the running\n zypper parent process and only check for 1 PID\n- From 10.3.2:\n + Remove rgnsrv-clnt-fix-docker-setup patch included upstream\n- From 10.3.1: (jsc#PCT-400)\n + Add support for LTSS registration\n + Add fix for sles12 disable registry issue:\n ~ No container support in SLE 12\n\n- Add fix for docker setup: (bsc#1229137)\n + The entry for the update infrastructure registry mirror was written\n incorrectly causing docker daemon startup to fail.\n\n- Update to version 10.3.0: (bsc#1227308, bsc#1222985)\n + Add support for sidecar registry\n Podman and rootless Docker support to set up the necessary \n configuration for the container engines to run as defined\n + Add running command as root through sudoers file\n\npython-toml: \n- Includes python311-toml as dependency for cloud-regionsrv-client\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Micro-6.1-18",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_20224-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:20224-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520224-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:20224-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021104.html"
},
{
"category": "self",
"summary": "SUSE Bug 1222985",
"url": "https://bugzilla.suse.com/1222985"
},
{
"category": "self",
"summary": "SUSE Bug 1227308",
"url": "https://bugzilla.suse.com/1227308"
},
{
"category": "self",
"summary": "SUSE Bug 1229137",
"url": "https://bugzilla.suse.com/1229137"
},
{
"category": "self",
"summary": "SUSE Bug 1229472",
"url": "https://bugzilla.suse.com/1229472"
},
{
"category": "self",
"summary": "SUSE Bug 1230615",
"url": "https://bugzilla.suse.com/1230615"
},
{
"category": "self",
"summary": "SUSE Bug 1232770",
"url": "https://bugzilla.suse.com/1232770"
},
{
"category": "self",
"summary": "SUSE Bug 1233333",
"url": "https://bugzilla.suse.com/1233333"
},
{
"category": "self",
"summary": "SUSE Bug 1234050",
"url": "https://bugzilla.suse.com/1234050"
}
],
"title": "Security update for cloud-regionsrv-client, python-toml",
"tracking": {
"current_release_date": "2025-02-20T12:41:47Z",
"generator": {
"date": "2025-02-20T12:41:47Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:20224-1",
"initial_release_date": "2025-02-20T12:41:47Z",
"revision_history": [
{
"date": "2025-02-20T12:41:47Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cloud-regionsrv-client-10.3.11-slfo.1.1_2.1.noarch",
"product": {
"name": "cloud-regionsrv-client-10.3.11-slfo.1.1_2.1.noarch",
"product_id": "cloud-regionsrv-client-10.3.11-slfo.1.1_2.1.noarch"
}
},
{
"category": "product_version",
"name": "cloud-regionsrv-client-addon-azure-1.0.5-slfo.1.1_2.1.noarch",
"product": {
"name": "cloud-regionsrv-client-addon-azure-1.0.5-slfo.1.1_2.1.noarch",
"product_id": "cloud-regionsrv-client-addon-azure-1.0.5-slfo.1.1_2.1.noarch"
}
},
{
"category": "product_version",
"name": "cloud-regionsrv-client-generic-config-1.0.0-slfo.1.1_2.1.noarch",
"product": {
"name": "cloud-regionsrv-client-generic-config-1.0.0-slfo.1.1_2.1.noarch",
"product_id": "cloud-regionsrv-client-generic-config-1.0.0-slfo.1.1_2.1.noarch"
}
},
{
"category": "product_version",
"name": "cloud-regionsrv-client-plugin-azure-2.0.0-slfo.1.1_2.1.noarch",
"product": {
"name": "cloud-regionsrv-client-plugin-azure-2.0.0-slfo.1.1_2.1.noarch",
"product_id": "cloud-regionsrv-client-plugin-azure-2.0.0-slfo.1.1_2.1.noarch"
}
},
{
"category": "product_version",
"name": "cloud-regionsrv-client-plugin-ec2-1.0.5-slfo.1.1_2.1.noarch",
"product": {
"name": "cloud-regionsrv-client-plugin-ec2-1.0.5-slfo.1.1_2.1.noarch",
"product_id": "cloud-regionsrv-client-plugin-ec2-1.0.5-slfo.1.1_2.1.noarch"
}
},
{
"category": "product_version",
"name": "cloud-regionsrv-client-plugin-gce-1.0.0-slfo.1.1_2.1.noarch",
"product": {
"name": "cloud-regionsrv-client-plugin-gce-1.0.0-slfo.1.1_2.1.noarch",
"product_id": "cloud-regionsrv-client-plugin-gce-1.0.0-slfo.1.1_2.1.noarch"
}
},
{
"category": "product_version",
"name": "python311-toml-0.10.2-slfo.1.1_1.2.noarch",
"product": {
"name": "python311-toml-0.10.2-slfo.1.1_1.2.noarch",
"product_id": "python311-toml-0.10.2-slfo.1.1_1.2.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Micro 6.1",
"product": {
"name": "SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sl-micro:6.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cloud-regionsrv-client-10.3.11-slfo.1.1_2.1.noarch as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:cloud-regionsrv-client-10.3.11-slfo.1.1_2.1.noarch"
},
"product_reference": "cloud-regionsrv-client-10.3.11-slfo.1.1_2.1.noarch",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cloud-regionsrv-client-addon-azure-1.0.5-slfo.1.1_2.1.noarch as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:cloud-regionsrv-client-addon-azure-1.0.5-slfo.1.1_2.1.noarch"
},
"product_reference": "cloud-regionsrv-client-addon-azure-1.0.5-slfo.1.1_2.1.noarch",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cloud-regionsrv-client-generic-config-1.0.0-slfo.1.1_2.1.noarch as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:cloud-regionsrv-client-generic-config-1.0.0-slfo.1.1_2.1.noarch"
},
"product_reference": "cloud-regionsrv-client-generic-config-1.0.0-slfo.1.1_2.1.noarch",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cloud-regionsrv-client-plugin-azure-2.0.0-slfo.1.1_2.1.noarch as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:cloud-regionsrv-client-plugin-azure-2.0.0-slfo.1.1_2.1.noarch"
},
"product_reference": "cloud-regionsrv-client-plugin-azure-2.0.0-slfo.1.1_2.1.noarch",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cloud-regionsrv-client-plugin-ec2-1.0.5-slfo.1.1_2.1.noarch as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:cloud-regionsrv-client-plugin-ec2-1.0.5-slfo.1.1_2.1.noarch"
},
"product_reference": "cloud-regionsrv-client-plugin-ec2-1.0.5-slfo.1.1_2.1.noarch",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cloud-regionsrv-client-plugin-gce-1.0.0-slfo.1.1_2.1.noarch as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:cloud-regionsrv-client-plugin-gce-1.0.0-slfo.1.1_2.1.noarch"
},
"product_reference": "cloud-regionsrv-client-plugin-gce-1.0.0-slfo.1.1_2.1.noarch",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-toml-0.10.2-slfo.1.1_1.2.noarch as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:python311-toml-0.10.2-slfo.1.1_1.2.noarch"
},
"product_reference": "python311-toml-0.10.2-slfo.1.1_1.2.noarch",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
}
]
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…