You are here
Home > Preporuke > Sigurnosni nedostatak programskog paketa python-azure-agent

Sigurnosni nedostatak programskog paketa python-azure-agent

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LSU

openSUSE Security Update: Security update for python-azure-agent

Announcement ID: openSUSE-SU-2020:0261-1
Rating: moderate
References: #1127838
Cross-References: CVE-2019-0804
Affected Products:
openSUSE Leap 15.1

An update that fixes one vulnerability is now available.


This update for python-azure-agent fixes the following issues:

python-azure-agent was updated to version 2.2.45 (jsc#ECO-80)

+ Add support for Gen2 VM resource disks
+ Use alternate systemd detection
+ Fix /proc/net/route requirement that causes errors on FreeBSD
+ Add cloud-init auto-detect to prevent multiple provisioning mechanisms
from relying on configuration for coordination
+ Disable cgroups when daemon is setup incorrectly
+ Remove upgrade extension loop for the same goal state
+ Add container id for extension telemetry events
+ Be more exact when detecting IMDS service health
+ Changing add_event to start sending missing fields

From 2.2.44 update:

+ Remove outdated extension ZIP packages
+ Improved error handling when starting extensions using systemd
+ Reduce provisioning time of some custom images
+ Improve the handling of extension download errors
+ New API for extension authors to handle errors during extension update
+ Fix handling of errors in calls to openssl
+ Improve logic to determine current distro
+ Reduce verbosity of several logging statements

From 2.2.42 update:

+ Poll for artifact blob, addresses goal state procesing issue

From 2.2.41 update:

+ Rewriting the mechanism to start the extension using systemd-run for
systems using systemd for managing
+ Refactoring of resource monitoring framework using cgroup for both
systemd and non-systemd approaches [#1530, #1534]
+ Telemetry pipeline for resource monitoring data

From 2.2.40 update:

+ Fixed tracking of memory/cpu usage
+ Do not prevent extensions from running if setting up cgroups fails
+ Enable systemd-aware deprovisioning on all versions >= 18.04
+ Add systemd support for Debian Jessie, Stretch, and Buster
+ Support for Linux Openwrt

From 2.2.38 update:

Security issue fixed:
+ CVE-2019-0804: An issue with swapfile handling in the agent creates a
data leak situation that exposes system memory data. (bsc#1127838)
+ Add fixes for handling swap file and other nit fixes

From 2.2.37 update:
+ Improves re-try logic to handle errors while downloading extensions

This update was imported from the SUSE:SLE-15-SP1:Update update project.

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

– openSUSE Leap 15.1:

zypper in -t patch openSUSE-2020-261=1

Package List:

– openSUSE Leap 15.1 (noarch):



To unsubscribe, e-mail:
For additional commands, e-mail:

AutorToni Vugdelija
Cert idNCERT-REF-2020-03-0001-ADV
More in Preporuke
Sigurnosni nedostatak jezgre operacijskog sustava

Otkriven je sigurnosni nedostatak jezgre operacijskog sustava Fedora. Otkriveni nedostatak potencijalnim napadačima omogućuje izazivanje DoS stanja. Savjetuje se ažuriranje izdanim...