SUSE: 2022:15036-1 moderate: SUSE Manager Client Tools
Summary
This update fixes the following issues: salt: - Put missing dpkgnotify pkgset beacon plugin to the salt-minion package (bsc#1202259) - Add support for gpgautoimport in zypperpkg module - Update Salt to work with Jinja >= and <= 3.1.0 (bsc#1198744) - Fix salt.states.file.managed() for follow_symlinks=True and test=True (bsc#1199372) - Make Salt 3004 compatible with pyzmq >= 23.0.0 (bsc#1201082) - Add support for name, pkgs and diff_attr parameters to upgrade function for zypper and yum (bsc#1198489) - Fix ownership of salt thin directory when using the Salt Bundle - Set default target for pip from VENV_PIP_TARGET environment variable - Normalize package names once with pkg.installed/removed using yum (bsc#1195895) - Save log to logfile with docker.build - Use Salt Bundle in dockermod - Ignore erros on reading license files with dpkg_lowpkg (bsc#1197288) - Fix PAM auth issue due missing check for PAM_ACCT_MGM return value (CVE-2022-22967) (bsc#1200566) scap-security-guide: - Fix the build for RHEL 7 and clones (python-setuptools is used) - Fix the build for RHEL 9 and clones - convert one bash emitter to new jinja method. (bsc#1200163) - Add python3-setuptools for all builds (so it is also used on debian and centos flavors) - Updated to 0.1.62 (jsc#ECO-3319) - Update rhel8 stig to v1r6 - OL7 STIG v2r7 update - Initial definition of ANSSI BP28 minmal profile for SLE - Updated to 0.1.61 (jsc#ECO-3319) - Stop building PCI-DSS-centric XCCDF benchmark for RHEL 7 - Introduce OL9 product - Implement handling of logical expressions in platform definitions - Bump disk size constraints to 7gb to avoid occasional disk fulls failures. spacecmd: - Version 4.3.14-1 * Fix missing argument on system_listmigrationtargets (bsc#1201003) * Show correct help on calling kickstart_importjson with no arguments * Fix tracebacks on spacecmd kickstart_export (bsc#1200591) * Change proxy container config default filename to end with tar.gz * Update translation strings Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Manager Ubuntu 20.04-CLIENT-TOOLS: zypper in -t patch suse-ubu204ct-client-tools-202208-15036=1 Package List: - SUSE Manager Ubuntu 20.04-CLIENT-TOOLS (all): salt-common-3004+ds-1+2.82.1 salt-minion-3004+ds-1+2.82.1 scap-security-guide-ubuntu-0.1.62-2.21.1 spacecmd-4.3.14-2.48.1
References
#1195895 #1197288 #1198489 #1198744 #1199372
#1200163 #1200566 #1200591 #1201003 #1201082
#1202259 ECO-3319
Cross- CVE-2022-22967
CVSS scores:
CVE-2022-22967 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2022-22967 (SUSE): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
SUSE Manager Ubuntu 20.04-CLIENT-TOOLS
https://www.suse.com/security/cve/CVE-2022-22967.html
https://bugzilla.suse.com/1195895
https://bugzilla.suse.com/1197288
https://bugzilla.suse.com/1198489
https://bugzilla.suse.com/1198744
https://bugzilla.suse.com/1199372
https://bugzilla.suse.com/1200163
https://bugzilla.suse.com/1200566
https://bugzilla.suse.com/1200591
https://bugzilla.suse.com/1201003
https://bugzilla.suse.com/1201082
https://bugzilla.suse.com/1202259