SUSE: 2022:3170-1 moderate: SUSE Manager Client Tools | LinuxSecuri...

   SUSE Security Update: Security update for SUSE Manager Client Tools
______________________________________________________________________________

Announcement ID:    SUSE-SU-2022:3170-1
Rating:             moderate
References:         #1195895 #1197288 #1198489 #1198744 #1199372 
                    #1200163 #1200566 #1200591 #1201003 #1201082 
                    #1202259 ECO-3319 
Cross-References:   CVE-2022-22967
CVSS scores:
                    CVE-2022-22967 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-22967 (SUSE): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

Affected Products:
                    SUSE Manager Debian 10-CLIENT-TOOLS
______________________________________________________________________________

   An update that solves one vulnerability, contains one
   feature and has 10 fixes is now available.

Description:

   This update fixes the following issues:

   salt:

   - Put missing dpkgnotify pkgset beacon plugin to the salt-minion package
     (bsc#1202259)
   - Add support for gpgautoimport in zypperpkg module
   - Update Salt to work with Jinja >= and <= 3.1.0 (bsc#1198744)
   - Fix salt.states.file.managed() for follow_symlinks=True and test=True
     (bsc#1199372)
   - Make Salt 3004 compatible with pyzmq >= 23.0.0 (bsc#1201082)
   - Add support for name, pkgs and diff_attr parameters to upgrade function
     for zypper and yum (bsc#1198489)
   - Fix ownership of salt thin directory when using the Salt Bundle
   - Set default target for pip from VENV_PIP_TARGET environment variable
   - Normalize package names once with pkg.installed/removed using yum
     (bsc#1195895)
   - Save log to logfile with docker.build
   - Use Salt Bundle in dockermod
   - Ignore erros on reading license files with dpkg_lowpkg (bsc#1197288)
   - Fix PAM auth issue due missing check for PAM_ACCT_MGM return value
     (CVE-2022-22967) (bsc#1200566)

   scap-security-guide:

   - Fix the build for RHEL 7 and clones (python-setuptools is used)
   - Fix the build for RHEL 9 and clones
   - convert one bash emitter to new jinja method.  (bsc#1200163)
   - Add python3-setuptools for all builds (so it is also used on debian and
     centos flavors)
   - Updated to 0.1.62 (jsc#ECO-3319)
     - Update rhel8 stig to v1r6
     - OL7 STIG v2r7 update
     - Initial definition of ANSSI BP28 minmal profile for SLE
   - Updated to 0.1.61 (jsc#ECO-3319)
     - Stop building PCI-DSS-centric XCCDF benchmark for RHEL 7
     - Introduce OL9 product
     - Implement handling of logical expressions in platform definitions
   - Bump disk size constraints to 7gb to avoid occasional disk fulls
     failures.

   spacecmd:

   - Version 4.3.14-1
     * Fix missing argument on system_listmigrationtargets (bsc#1201003)
     * Show correct help on calling kickstart_importjson with no arguments
     * Fix tracebacks on spacecmd kickstart_export (bsc#1200591)
     * Change proxy container config default filename to end with tar.gz
     * Update translation strings


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Manager Debian 10-CLIENT-TOOLS:

      zypper in -t patch SUSE-Debian-10-CLIENT-TOOLS-x86_64-2022-3170=1



Package List:

   - SUSE Manager Debian 10-CLIENT-TOOLS (all):

      salt-common-3004+ds-1+2.61.1
      salt-minion-3004+ds-1+2.61.1
      scap-security-guide-debian-0.1.62-2.21.1
      spacecmd-4.3.14-2.33.1


References:

   https://www.suse.com/security/cve/CVE-2022-22967.html
   https://bugzilla.suse.com/1195895
   https://bugzilla.suse.com/1197288
   https://bugzilla.suse.com/1198489
   https://bugzilla.suse.com/1198744
   https://bugzilla.suse.com/1199372
   https://bugzilla.suse.com/1200163
   https://bugzilla.suse.com/1200566
   https://bugzilla.suse.com/1200591
   https://bugzilla.suse.com/1201003
   https://bugzilla.suse.com/1201082
   https://bugzilla.suse.com/1202259

SUSE: 2022:3170-1 moderate: SUSE Manager Client Tools

September 8, 2022
An update that solves one vulnerability, contains one feature and has 10 fixes is now available

Summary

This update fixes the following issues: salt: - Put missing dpkgnotify pkgset beacon plugin to the salt-minion package (bsc#1202259) - Add support for gpgautoimport in zypperpkg module - Update Salt to work with Jinja >= and <= 3.1.0 (bsc#1198744) - Fix salt.states.file.managed() for follow_symlinks=True and test=True (bsc#1199372) - Make Salt 3004 compatible with pyzmq >= 23.0.0 (bsc#1201082) - Add support for name, pkgs and diff_attr parameters to upgrade function for zypper and yum (bsc#1198489) - Fix ownership of salt thin directory when using the Salt Bundle - Set default target for pip from VENV_PIP_TARGET environment variable - Normalize package names once with pkg.installed/removed using yum (bsc#1195895) - Save log to logfile with docker.build - Use Salt Bundle in dockermod - Ignore erros on reading license files with dpkg_lowpkg (bsc#1197288) - Fix PAM auth issue due missing check for PAM_ACCT_MGM return value (CVE-2022-22967) (bsc#1200566) scap-security-guide: - Fix the build for RHEL 7 and clones (python-setuptools is used) - Fix the build for RHEL 9 and clones - convert one bash emitter to new jinja method. (bsc#1200163) - Add python3-setuptools for all builds (so it is also used on debian and centos flavors) - Updated to 0.1.62 (jsc#ECO-3319) - Update rhel8 stig to v1r6 - OL7 STIG v2r7 update - Initial definition of ANSSI BP28 minmal profile for SLE - Updated to 0.1.61 (jsc#ECO-3319) - Stop building PCI-DSS-centric XCCDF benchmark for RHEL 7 - Introduce OL9 product - Implement handling of logical expressions in platform definitions - Bump disk size constraints to 7gb to avoid occasional disk fulls failures. spacecmd: - Version 4.3.14-1 * Fix missing argument on system_listmigrationtargets (bsc#1201003) * Show correct help on calling kickstart_importjson with no arguments * Fix tracebacks on spacecmd kickstart_export (bsc#1200591) * Change proxy container config default filename to end with tar.gz * Update translation strings Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Manager Debian 10-CLIENT-TOOLS: zypper in -t patch SUSE-Debian-10-CLIENT-TOOLS-x86_64-2022-3170=1 Package List: - SUSE Manager Debian 10-CLIENT-TOOLS (all): salt-common-3004+ds-1+2.61.1 salt-minion-3004+ds-1+2.61.1 scap-security-guide-debian-0.1.62-2.21.1 spacecmd-4.3.14-2.33.1

References

#1195895 #1197288 #1198489 #1198744 #1199372

#1200163 #1200566 #1200591 #1201003 #1201082

#1202259 ECO-3319

Cross- CVE-2022-22967

CVSS scores:

CVE-2022-22967 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVE-2022-22967 (SUSE): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

Affected Products:

SUSE Manager Debian 10-CLIENT-TOOLS

https://www.suse.com/security/cve/CVE-2022-22967.html

https://bugzilla.suse.com/1195895

https://bugzilla.suse.com/1197288

https://bugzilla.suse.com/1198489

https://bugzilla.suse.com/1198744

https://bugzilla.suse.com/1199372

https://bugzilla.suse.com/1200163

https://bugzilla.suse.com/1200566

https://bugzilla.suse.com/1200591

https://bugzilla.suse.com/1201003

https://bugzilla.suse.com/1201082

https://bugzilla.suse.com/1202259

Severity
Announcement ID: SUSE-SU-2022:3170-1
Rating: moderate

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.