-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2019.2422
              SUSE-SU-2019:1220-2 Security update for cf-cli
                                3 July 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           cf-cli
Publisher:         SUSE
Operating System:  SUSE
Impact/Access:     Access Privileged Data -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-3781  

Reference:         ESB-2019.1685

Original Bulletin: 
   https://www.suse.com/support/update/announcement/2019/suse-su-20191220-2.html

- --------------------------BEGIN INCLUDED TEXT--------------------

SUSE Security Update: Security update for cf-cli

______________________________________________________________________________

Announcement ID:   SUSE-SU-2019:1220-2
Rating:            moderate
References:        #1132242
Cross-References:  CVE-2019-3781
Affected Products:
                   SUSE Linux Enterprise Module for CAP 15-SP1
______________________________________________________________________________

An update that fixes one vulnerability is now available.

Description:

This update for cf-cli fixes the following issues:
cf-cli was updated: to version 6.43.0 (bsc#1132242)
Enhancements :

  o `cf curl` supports a new `--fail` flag (primarily for scripting purposes)
    which returns exit code `22` for server errors [story](https://
    www.pivotaltracker.com/story/show/130060949)
  o Improves `cf delete-orphaned-routes` such that it uses a different
    endpoint, reducing the chance of a race condition when two users are
    simultaneously deleting orphaned routes and associating routes with
    applications [story](https://www.pivotaltracker.com/story/show/163156064)
  o we've improved the speed of cf services - it now hits a single endpoint
    instead of making individual API calls


Security:

  o CVE-2019-3781: CF CLI does not sanitize user  s password in verbose/trace/
    debug.
  o Fixes issue with running cf login in verbose mode whereby passwords which
    contains regex were not completely redacted
  o Fixes issue whilst running commands in verbose mode refresh tokens were not
    completely redacted


Other Bug Fixes:

  o Updates help text for cf curlstory
  o Now refresh tokens work properly whilst using cf curl with V3 CC API
    endpoints story
  o Fixes performance degradation for cf services story
  o cf delete-service requires that you are targeting a space story
  o cf enable-service access for a service in an org will succeed if you have
    already enabled access for that service in that org story


cf-cli was updated to version 6.42.0:
Minor Enhancements:

  o updated `cf restage` help text and the first line in the command's output
    to indicate that using this command will cause app downtime [story](https:/
    /www.pivotaltracker.com/story/show/151841382)
  o updated the `cf bind-route-service` help text to clarify usage instructions
    [story](https://www.pivotaltracker.com/story/show/150111078)
  o improved an error message for `cf create-service-boker` to be more helpful
    when the CC API returns a `502` due to an invalid service broker catalog
  o upgraded to Golang 1.11.4 [story](https://www.pivotaltracker.com/story/show
    /162745359)
  o added a short name `ue` for `cf unset-env` [story](https://
    www.pivotaltracker.com/story/show/161632713)
  o updated `cf marketplace` command to include a new `broker` column to
    prepare for a upcoming services-related feature which will allow services
    to have the same name as long as they are associated with different service
    brokers [story](https://www.pivotaltracker.com/story/show/162699756)


Bugs:

  o fix for `cf enable-service-access -p plan` whereby when we refactored the
    code in CLI `v6.41.0` it created service plan visibilities as part of a
    subsequent run of the command (the unrefactored code skipped creating the
    service plan visibilities); now the command will skip creating service plan
    visibilities as it did prior to the refactor [story](https://
    www.pivotaltracker.com/story/show/162747373)
  o updated the `cf rename-buildpack` help text which was missing reference to
    the `-s` stack flag [story](https://www.pivotaltracker.com/story/show/
    162428661)
  o updated help text for when users use `brew search cloudfoundry-cli` [story]
    (https://www.pivotaltracker.com/story/show/161770940)
  o now when you run `cf service service-instance` for a route service, the
    route service url appears in the key value table [story](https://
    www.pivotaltracker.com/story/show/162498211)


Update to version 6.41.0:
Enhancements:

  o updated `cf --help` to include the `delete` command [story](https://
    www.pivotaltracker.com/story/show/161556511)


Update to version 6.40.1:
Bug Fixes:

  o Updates the minimum version for the buildpacks-stacks association feature.
    In [CLI v6.39.0](https://github.com/cloudfoundry/cli/releases/tag/v6.39.0),
    when the feature was released, we incorrectly set the minimum to cc api
    version as`2.114`. The minimum cc api version is now correctly set to

[`2.112`](https://github.com/cloudfoundry/capi-release/releases/tag/1.58.0) .
[story](https://www.pivotaltracker.com/story/show/161464797)
Fixes a bug with inspecting a service instance `cf service service-instance`,
now the `documentation` url displays correctly for services which populate that
field [story](https://www.pivotaltracker.com/story/show/161251875)
Update to version 6.40.0:
Bug Fixes:

  o Fix bug where trailing slash on cf api would break listing commands for
    older CC APIs story. For older versions of CC API, if the API URL had a
    trailing slash, some requests would fail with an "Unknown request" error.
    These requests are now handled properly.


Update to version 6.39.0:
Enhancements:

  o for users on cc api 3.27, cf start is enhanced to display the new cf app v3
    output. For users on cc api 3.27 or lower, users will see the same v2
    output. Note that if you use v3 commands to create and start your app, if
    you subsequently use cf stop and cf start, the routes property in cf app
    will not populate even though the route exists story
  o for users on cc api 3.27, cf restart is enhanced to display the new cf app
    v3 output. For users on cc api 3.27 or lower, users will see the same v2
    output. story
  o for users on cc api 3.27, cf restage is enhanced to display the new cf app
    v3 output. For users on cc api 3.27 or lower, users will see the same v2
    output. story
  o improved help text for -d domains for cf push to include examples of usage
    story
  o cf v3-scale displays additional app information story
  o if you've created an internal domain, and it is the first domain in cc, the
    CLI will now ignore the internal domain and instead choose the next
    non-internal domain when you push an app story


Bug Fixes:

  o Fix for users on macOS attempting to brew install cf-cli the CF CLI using
    the unreleased master branch of Homebrew story
  o Fixes an issue whereby, due to a recent cc api change, when you execute cf
    push and watch the cf app command, the app display returned a 400 error
    story
  o Fixes a bug whereby if you logged in using client credentials, cf auth user
    pass --client credentials you were unable to create an org; now create-org
    will assign the role to the user id specified in your manifest story
  o fixes an issue introduced when we refactored cf start and as part of that
    work, we stopped blocking on the initial connection with the logging
    backend; now the CLI blocks until the NOAA connection is made, or the
    default dial timeout of five seconds is reached story


update to version 6.38.0:
Enhancements:

  o v3-ssh process type now defaults to web story
  o Support added for setting tags for user provided service instances story
  o Now a warning appears if you attempt to use deprecated properties and
    variable substitution story
  o Updated usage so now you can rename the cf binary use it with every command
    story
  o cf events now displays the Diego cell_id and instance guid in crash events
    story
  o Includes cf service service-instance table display improvements wherein the
    service instance information is now grouped separately from the binding
    information story
  o cf service service-instance table display information for user provided
    services changed: status has been added to the table story


Bug Fixes:

  o the CLI now properly handles escaped commas in the X-Cf-Warnings header


Update to version 6.37.0:
Enhancements

  o The api/cloudcontroller/ccv2 package has been updated with more functions #
    1343
  o Now a warning appears if you are using a API version older than 2.69.0,
    which is no longer officially supported
  o Now the CLI reads the username and password from the environment variables
    #1358


Bug Fixes:

  o Fixes bug whereby X-Cf-Warnings were not being unescaped when displayed to
    user #1361
  o When using CF_TRACE=1, passwords are now sanitized #1375 and tracker


Update to version 6.36.0:
Bug Fixes:

  o int64 support for cf/flags library, #1333
  o Debian package, #1336
  o Web action flag not working on CLI 0.6.5, #1337
  o When a cf push upload fails/Consul is down, a panic occurs, #1340 and #1351


update to version 6.35.2:
Bug Fixes:

  o Providing a clearer services authorization warning message when a service
    has been disabled for the organization, fixing #1344

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  o SUSE Linux Enterprise Module for CAP 15-SP1:
    zypper in -t patch SUSE-SLE-Module-CAP-Tools-15-SP1-2019-1220=1

Package List:

  o SUSE Linux Enterprise Module for CAP 15-SP1 (x86_64):
       cf-cli-6.43.0-3.3.2


References:

  o https://www.suse.com/security/cve/CVE-2019-3781.html
  o https://bugzilla.suse.com/1132242

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=HqIX
-----END PGP SIGNATURE-----