SUSE Security Update: Security Beta update for SUSE Manager Client Tools
______________________________________________________________________________

Announcement ID:    SUSE-SU-2021:3901-1
Rating:             moderate
References:         #1164192 #1167586 #1168327 #1173103 #1173692 
                    #1180650 #1181223 #1184659 #1185131 #1186287 
                    #1186310 #1186581 #1186674 #1186738 #1187787 
                    #1187813 #1188042 #1188170 #1188259 #1188647 
                    #1188977 #1189040 #1190265 #1190446 #1190512 
                    #1191412 #1191431 ECO-3212 ECO-3319 SLE-18028 
                    SLE-18033 
Cross-References:   CVE-2021-21996
CVSS scores:
                    CVE-2021-21996 (SUSE): 4.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L

Affected Products:
                    SUSE Manager Debian 10-CLIENT-TOOLS-BETA
______________________________________________________________________________

   An update that solves one vulnerability, contains four
   features and has 26 fixes is now available.

Description:

   This update fixes the following issues:

   salt:

   - Simplify "transactional_update" module to not use SSH wrapper and allow
     more flexible execution
   - Add "--no-return-event" option to salt-call to prevent sending return
     event back to master.
   - Make "state.highstate" to acts on concurrent flag.
   - Fix print regression for yumnotify plugin
   - Use dnfnotify instead yumnotify for relevant distros
   - Dnfnotify pkgset plugin implementation
   - Add rpm_vercmp python library support for version comparison
   - Prevent pkg plugins errors on missing cookie path (bsc#1186738)
   - Fix ip6_interface grain to not leak secondary IPv4 aliases (bsc#1191412)
   - Make "salt-api" package to require python3-cherrypy on RHEL systems
   - Make "tar" as required for "salt-transactional-update" package
   - Fix issues with salt-ssh's extra-filerefs
   - Fix crash when calling manage.not_alive runners   - Do not consider skipped targets as failed for ansible.playbooks state
     (bsc#1190446)
   - Do not break master_tops for minion with version lower to 3003
   - Support querying for JSON data in external sql pillar
   - Update to Salt release version 3003.3
   - See release notes:
     https://docs.saltstack.com/en/latest/topics/releases/3003.3.html
   - Exclude the full path of a download URL to prevent injection of
     malicious code (bsc#1190265) (CVE-2021-21996)
   - Fix wrong relative paths resolution with Jinja renderer when importing
     subdirectories
   - Don't pass shell="/sbin/nologin" to onlyif/unless checks (bsc#1188259)
   - Add missing aarch64 to rpm package architectures
   - Backport of upstream PR#59492
   - Fix failing unit test for systemd
   - Fix error handling in openscap module (bsc#1188647)
   - Better handling of bad public keys from minions (bsc#1189040)
   - Define license macro as doc in spec file if not existing
   - Add standalone formulas configuration for salt minion and remove
     salt-master requirement (bsc#1168327)
   - Do noop for services states when running systemd in offline mode
     (bsc#1187787)
   - Transactional_updates: do not execute states in parallel but use a queue
     (bsc#1188170)
   - Handle "master tops" data when states are applied by
     "transactional_update" (bsc#1187787)
   - Enhance openscap module: add "xccdf_eval" call
   - Virt: pass emulator when getting domain capabilities from libvirt
   - Adding preliminary support for Rocky Linux
   - Implementation of held/unheld functions for state pkg (bsc#1187813)
   - Replace deprecated Thread.isAlive() with Thread.is_alive()
   - Fix exception in yumpkg.remove for not installed package
   - Fix save for iptables state module (bsc#1185131)
   - Virt: use /dev/kvm to detect KVM
   - Zypperpkg: improve logic for handling vendorchange flags
   - Add bundled provides for tornado to the spec file
   - Enhance logging when inotify beacon is missing pyinotify (bsc#1186310)
   - Add "python3-pyinotify" as a recommended package for Salt in
     SUSE/openSUSE distros
   - Fix tmpfiles.d configuration for salt to not use legacy paths
     (bsc#1173103)
   - Detect Python version to use inside container (bsc#1167586) (bsc#1164192)
   - Handle volumes on stopped pools in virt.vm_info (bsc#1186287)
   - Grains.extra: support old non-intel kernels (bsc#1180650)
   - Fix missing minion returns in batch mode (bsc#1184659)
   - Parsing Epoch out of version provided during pkg remove (bsc#1173692)
   - Check if dpkgnotify is executable (bsc#1186674)
   - Update to Salt release version 3002.2 (jsc#ECO-3212) (jsc#SLE-18033)
   - Add subpackage salt-transactional-update (jsc#SLE-18028)

   scap-security-guide:

   - Fix SLE-12 build issue caused by '\xb0' character (bsc#1191431).
   - Updated to 0.1.58 release (jsc#ECO-3319)
   - Support for Script Checking Engine (SCE)
   - Split RHEL 8 CIS profile using new controls file format
   - CIS Profiles for SLE12
   - Initial Ubuntu 20.04 STIG Profiles
   - Addition of an automated CCE adder
   - Updated to 0.1.57 release (jsc#ECO-3319)
     - CIS profile for RHEL 7 is updated
     - initial CIS profiles for Ubuntu 20.04
     - Major improvement of RHEL 9 content
     - new release process implemented using Github actions
   - Specify the maintainer, for deb packages.
   - Updated to 0.1.56 release (jsc#ECO-3319)
     - Align ism_o profile with latest ISM SSP (#6878)
     - Align RHEL 7 STIG profile with DISA STIG V3R3
     - Creating new RHEL 7 STIG GUI profile (#6863)
     - Creating new RHEL 8 STIG GUI profile (#6862)
     - Add the RHEL9 product (#6801)
     - Initial support for SUSE SLE-15 (#6666)
     - add support for osbuild blueprint remediations (#6970)
   - Updated to a intermediate GIT snapshot of 20210323 (jsc#ECO-3319)
     - initial SLES15 STIG added
     - more SLES 12 STIG work
     - correct tables and cross references for SLES 12 and 15 STIG
   - Updated to 0.1.55 release (jsc#ECO-3319)
     - big update of rules used in SLES-12 STIG profile
     - Render policy to HTML (#6532)
     - Add variable support to yamlfile_value template (#6563)
     - Introduce new template for dconf configuration files (#6118)
   - Avoid some non sles12 sp2 available macros.

   spacecmd:

   - Version 4.3.4-1
     * Update translation strings
   - Version 4.3.3-1
     * Improved event history listing and added new system_eventdetails
       command to retrieve the details of an event
     * configchannel_updatefile handles directory properly (bsc#1190512)
   - Version 4.3.2-1
     * Add schedule_archivecompleted to mass archive actions (bsc#1181223)
     * Make schedule_deletearchived to get all actions without display limit
     * Allow passing a date limit for schedule_deletearchived on spacecmd
       (bsc#1181223)
     * Remove whoami from the list of unauthenticated commands (bsc#1188977)
   - Version 4.3.1-1
   - Use correct API endpoint in list_proxies (bsc#1188042)
   - Add schedule_deletearchived to bulk delete archived actions (bsc#1181223)
   - Make spacecmd aware of retracted patches/packages
   - Version 4.2.10-1
   - Enhance help for installation types when creating distributions
     (bsc#1186581)
   - Version 4.2.9-1
   - Parse empty argument when nothing in between the separator


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Manager Debian 10-CLIENT-TOOLS-BETA:

      zypper in -t patch SUSE-Debian-10-CLIENT-TOOLS-BETA-2021-3901=1



Package List:

   - SUSE Manager Debian 10-CLIENT-TOOLS-BETA (all):

      salt-common-3003.3+ds-1+2.27.1
      salt-minion-3003.3+ds-1+2.27.1
      scap-security-guide-debian-0.1.58-2.6.1
      spacecmd-4.3.4-2.20.1


References:

   https://www.suse.com/security/cve/CVE-2021-21996.html
   https://bugzilla.suse.com/1164192
   https://bugzilla.suse.com/1167586
   https://bugzilla.suse.com/1168327
   https://bugzilla.suse.com/1173103
   https://bugzilla.suse.com/1173692
   https://bugzilla.suse.com/1180650
   https://bugzilla.suse.com/1181223
   https://bugzilla.suse.com/1184659
   https://bugzilla.suse.com/1185131
   https://bugzilla.suse.com/1186287
   https://bugzilla.suse.com/1186310
   https://bugzilla.suse.com/1186581
   https://bugzilla.suse.com/1186674
   https://bugzilla.suse.com/1186738
   https://bugzilla.suse.com/1187787
   https://bugzilla.suse.com/1187813
   https://bugzilla.suse.com/1188042
   https://bugzilla.suse.com/1188170
   https://bugzilla.suse.com/1188259
   https://bugzilla.suse.com/1188647
   https://bugzilla.suse.com/1188977
   https://bugzilla.suse.com/1189040
   https://bugzilla.suse.com/1190265
   https://bugzilla.suse.com/1190446
   https://bugzilla.suse.com/1190512
   https://bugzilla.suse.com/1191412
   https://bugzilla.suse.com/1191431

SUSE: 2021:3901-1 moderate: Security Beta SUSE Manager Client Tools

December 3, 2021
An update that solves one vulnerability, contains four features and has 26 fixes is now available

Summary

This update fixes the following issues: salt: - Simplify "transactional_update" module to not use SSH wrapper and allow more flexible execution - Add "--no-return-event" option to salt-call to prevent sending return event back to master. - Make "state.highstate" to acts on concurrent flag. - Fix print regression for yumnotify plugin - Use dnfnotify instead yumnotify for relevant distros - Dnfnotify pkgset plugin implementation - Add rpm_vercmp python library support for version comparison - Prevent pkg plugins errors on missing cookie path (bsc#1186738) - Fix ip6_interface grain to not leak secondary IPv4 aliases (bsc#1191412) - Make "salt-api" package to require python3-cherrypy on RHEL systems - Make "tar" as required for "salt-transactional-update" package - Fix issues with salt-ssh's extra-filerefs - Fix crash when calling manage.not_alive runners - Do not consider skipped targets as failed for ansible.playbooks state (bsc#1190446) - Do not break master_tops for minion with version lower to 3003 - Support querying for JSON data in external sql pillar - Update to Salt release version 3003.3 - See release notes: https://docs.saltstack.com/en/latest/topics/releases/3003.3.html - Exclude the full path of a download URL to prevent injection of malicious code (bsc#1190265) (CVE-2021-21996) - Fix wrong relative paths resolution with Jinja renderer when importing subdirectories - Don't pass shell="/sbin/nologin" to onlyif/unless checks (bsc#1188259) - Add missing aarch64 to rpm package architectures - Backport of upstream PR#59492 - Fix failing unit test for systemd - Fix error handling in openscap module (bsc#1188647) - Better handling of bad public keys from minions (bsc#1189040) - Define license macro as doc in spec file if not existing - Add standalone formulas configuration for salt minion and remove salt-master requirement (bsc#1168327) - Do noop for services states when running systemd in offline mode (bsc#1187787) - Transactional_updates: do not execute states in parallel but use a queue (bsc#1188170) - Handle "master tops" data when states are applied by "transactional_update" (bsc#1187787) - Enhance openscap module: add "xccdf_eval" call - Virt: pass emulator when getting domain capabilities from libvirt - Adding preliminary support for Rocky Linux - Implementation of held/unheld functions for state pkg (bsc#1187813) - Replace deprecated Thread.isAlive() with Thread.is_alive() - Fix exception in yumpkg.remove for not installed package - Fix save for iptables state module (bsc#1185131) - Virt: use /dev/kvm to detect KVM - Zypperpkg: improve logic for handling vendorchange flags - Add bundled provides for tornado to the spec file - Enhance logging when inotify beacon is missing pyinotify (bsc#1186310) - Add "python3-pyinotify" as a recommended package for Salt in SUSE/openSUSE distros - Fix tmpfiles.d configuration for salt to not use legacy paths (bsc#1173103) - Detect Python version to use inside container (bsc#1167586) (bsc#1164192) - Handle volumes on stopped pools in virt.vm_info (bsc#1186287) - Grains.extra: support old non-intel kernels (bsc#1180650) - Fix missing minion returns in batch mode (bsc#1184659) - Parsing Epoch out of version provided during pkg remove (bsc#1173692) - Check if dpkgnotify is executable (bsc#1186674) - Update to Salt release version 3002.2 (jsc#ECO-3212) (jsc#SLE-18033) - Add subpackage salt-transactional-update (jsc#SLE-18028) scap-security-guide: - Fix SLE-12 build issue caused by '\xb0' character (bsc#1191431). - Updated to 0.1.58 release (jsc#ECO-3319) - Support for Script Checking Engine (SCE) - Split RHEL 8 CIS profile using new controls file format - CIS Profiles for SLE12 - Initial Ubuntu 20.04 STIG Profiles - Addition of an automated CCE adder - Updated to 0.1.57 release (jsc#ECO-3319) - CIS profile for RHEL 7 is updated - initial CIS profiles for Ubuntu 20.04 - Major improvement of RHEL 9 content - new release process implemented using Github actions - Specify the maintainer, for deb packages. - Updated to 0.1.56 release (jsc#ECO-3319) - Align ism_o profile with latest ISM SSP (#6878) - Align RHEL 7 STIG profile with DISA STIG V3R3 - Creating new RHEL 7 STIG GUI profile (#6863) - Creating new RHEL 8 STIG GUI profile (#6862) - Add the RHEL9 product (#6801) - Initial support for SUSE SLE-15 (#6666) - add support for osbuild blueprint remediations (#6970) - Updated to a intermediate GIT snapshot of 20210323 (jsc#ECO-3319) - initial SLES15 STIG added - more SLES 12 STIG work - correct tables and cross references for SLES 12 and 15 STIG - Updated to 0.1.55 release (jsc#ECO-3319) - big update of rules used in SLES-12 STIG profile - Render policy to HTML (#6532) - Add variable support to yamlfile_value template (#6563) - Introduce new template for dconf configuration files (#6118) - Avoid some non sles12 sp2 available macros. spacecmd: - Version 4.3.4-1 * Update translation strings - Version 4.3.3-1 * Improved event history listing and added new system_eventdetails command to retrieve the details of an event * configchannel_updatefile handles directory properly (bsc#1190512) - Version 4.3.2-1 * Add schedule_archivecompleted to mass archive actions (bsc#1181223) * Make schedule_deletearchived to get all actions without display limit * Allow passing a date limit for schedule_deletearchived on spacecmd (bsc#1181223) * Remove whoami from the list of unauthenticated commands (bsc#1188977) - Version 4.3.1-1 - Use correct API endpoint in list_proxies (bsc#1188042) - Add schedule_deletearchived to bulk delete archived actions (bsc#1181223) - Make spacecmd aware of retracted patches/packages - Version 4.2.10-1 - Enhance help for installation types when creating distributions (bsc#1186581) - Version 4.2.9-1 - Parse empty argument when nothing in between the separator Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Manager Debian 10-CLIENT-TOOLS-BETA: zypper in -t patch SUSE-Debian-10-CLIENT-TOOLS-BETA-2021-3901=1 Package List: - SUSE Manager Debian 10-CLIENT-TOOLS-BETA (all): salt-common-3003.3+ds-1+2.27.1 salt-minion-3003.3+ds-1+2.27.1 scap-security-guide-debian-0.1.58-2.6.1 spacecmd-4.3.4-2.20.1

References

#1164192 #1167586 #1168327 #1173103 #1173692

#1180650 #1181223 #1184659 #1185131 #1186287

#1186310 #1186581 #1186674 #1186738 #1187787

#1187813 #1188042 #1188170 #1188259 #1188647

#1188977 #1189040 #1190265 #1190446 #1190512

#1191412 #1191431 ECO-3212 ECO-3319 SLE-18028

SLE-18033

Cross- CVE-2021-21996

CVSS scores:

CVE-2021-21996 (SUSE): 4.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L

Affected Products:

SUSE Manager Debian 10-CLIENT-TOOLS-BETA

https://www.suse.com/security/cve/CVE-2021-21996.html

https://bugzilla.suse.com/1164192

https://bugzilla.suse.com/1167586

https://bugzilla.suse.com/1168327

https://bugzilla.suse.com/1173103

https://bugzilla.suse.com/1173692

https://bugzilla.suse.com/1180650

https://bugzilla.suse.com/1181223

https://bugzilla.suse.com/1184659

https://bugzilla.suse.com/1185131

https://bugzilla.suse.com/1186287

https://bugzilla.suse.com/1186310

https://bugzilla.suse.com/1186581

https://bugzilla.suse.com/1186674

https://bugzilla.suse.com/1186738

https://bugzilla.suse.com/1187787

https://bugzilla.suse.com/1187813

https://bugzilla.suse.com/1188042

https://bugzilla.suse.com/1188170

https://bugzilla.suse.com/1188259

https://bugzilla.suse.com/1188647

https://bugzilla.suse.com/1188977

https://bugzilla.suse.com/1189040

https://bugzilla.suse.com/1190265

https://bugzilla.suse.com/1190446

https://bugzilla.suse.com/1190512

https://bugzilla.suse.com/1191412

https://bugzilla.suse.com/1191431

Severity
Announcement ID: SUSE-SU-2021:3901-1
Rating: moderate

Related News