SUSE-SU-2021:3903-1: moderate: Security Beta update for SUSE Manager Client Tools

sle-updates at lists.suse.com sle-updates at lists.suse.com
Fri Dec 3 14:42:56 UTC 2021


   SUSE Security Update: Security Beta update for SUSE Manager Client Tools
______________________________________________________________________________

Announcement ID:    SUSE-SU-2021:3903-1
Rating:             moderate
References:         #1164192 #1167586 #1168327 #1173103 #1173692 
                    #1180650 #1181223 #1184659 #1185131 #1186287 
                    #1186310 #1186581 #1186674 #1186738 #1187787 
                    #1187813 #1188042 #1188170 #1188259 #1188647 
                    #1188977 #1189040 #1190265 #1190446 #1190512 
                    #1191412 #1191431 ECO-3212 ECO-3319 SLE-18028 
                    SLE-18033 
Cross-References:   CVE-2021-21996
CVSS scores:
                    CVE-2021-21996 (SUSE): 4.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L

Affected Products:
                    SUSE Manager Ubuntu 18.04-CLIENT-TOOLS-BETA
______________________________________________________________________________

   An update that solves one vulnerability, contains four
   features and has 26 fixes is now available.

Description:

   This update fixes the following issues:

   salt:

   - Simplify "transactional_update" module to not use SSH wrapper and allow
     more flexible execution
   - Add "--no-return-event" option to salt-call to prevent sending return
     event back to master.
   - Make "state.highstate" to acts on concurrent flag.
   - Fix print regression for yumnotify plugin
   - Use dnfnotify instead yumnotify for relevant distros
   - Dnfnotify pkgset plugin implementation
   - Add rpm_vercmp python library support for version comparison
   - Prevent pkg plugins errors on missing cookie path (bsc#1186738)
   - Fix ip6_interface grain to not leak secondary IPv4 aliases (bsc#1191412)
   - Make "salt-api" package to require python3-cherrypy on RHEL systems
   - Make "tar" as required for "salt-transactional-update" package
   - Fix issues with salt-ssh's extra-filerefs
   - Fix crash when calling manage.not_alive runners
   - Do not consider skipped targets as failed for ansible.playbooks state
     (bsc#1190446)
   - Do not break master_tops for minion with version lower to 3003
   - Support querying for JSON data in external sql pillar
   - Update to Salt release version 3003.3
   - See release notes:
     https://docs.saltstack.com/en/latest/topics/releases/3003.3.html
   - Exclude the full path of a download URL to prevent injection of
     malicious code (bsc#1190265) (CVE-2021-21996)
   - Fix wrong relative paths resolution with Jinja renderer when importing
     subdirectories
   - Don't pass shell="/sbin/nologin" to onlyif/unless checks (bsc#1188259)
   - Add missing aarch64 to rpm package architectures
   - Backport of upstream PR#59492
   - Fix failing unit test for systemd
   - Fix error handling in openscap module (bsc#1188647)
   - Better handling of bad public keys from minions (bsc#1189040)
   - Define license macro as doc in spec file if not existing
   - Add standalone formulas configuration for salt minion and remove
     salt-master requirement (bsc#1168327)
   - Do noop for services states when running systemd in offline mode
     (bsc#1187787)
   - Transactional_updates: do not execute states in parallel but use a queue
     (bsc#1188170)
   - Handle "master tops" data when states are applied by
     "transactional_update" (bsc#1187787)
   - Enhance openscap module: add "xccdf_eval" call
   - Virt: pass emulator when getting domain capabilities from libvirt
   - Adding preliminary support for Rocky Linux
   - Implementation of held/unheld functions for state pkg (bsc#1187813)
   - Replace deprecated Thread.isAlive() with Thread.is_alive()
   - Fix exception in yumpkg.remove for not installed package
   - Fix save for iptables state module (bsc#1185131)
   - Virt: use /dev/kvm to detect KVM
   - Zypperpkg: improve logic for handling vendorchange flags
   - Add bundled provides for tornado to the spec file
   - Enhance logging when inotify beacon is missing pyinotify (bsc#1186310)
   - Add "python3-pyinotify" as a recommended package for Salt in
     SUSE/openSUSE distros
   - Fix tmpfiles.d configuration for salt to not use legacy paths
     (bsc#1173103)
   - Detect Python version to use inside container (bsc#1167586) (bsc#1164192)
   - Handle volumes on stopped pools in virt.vm_info (bsc#1186287)
   - Grains.extra: support old non-intel kernels (bsc#1180650)
   - Fix missing minion returns in batch mode (bsc#1184659)
   - Parsing Epoch out of version provided during pkg remove (bsc#1173692)
   - Check if dpkgnotify is executable (bsc#1186674)
   - Update to Salt release version 3002.2 (jsc#ECO-3212) (jsc#SLE-18033)
   - Add subpackage salt-transactional-update (jsc#SLE-18028)

   scap-security-guide:

   - Fix SLE-12 build issue caused by '\xb0' character (bsc#1191431).
   - Updated to 0.1.58 release (jsc#ECO-3319)
   - Support for Script Checking Engine (SCE)
   - Split RHEL 8 CIS profile using new controls file format
   - CIS Profiles for SLE12
   - Initial Ubuntu 20.04 STIG Profiles
   - Addition of an automated CCE adder
   - Updated to 0.1.57 release (jsc#ECO-3319)
     - CIS profile for RHEL 7 is updated
     - initial CIS profiles for Ubuntu 20.04
     - Major improvement of RHEL 9 content
     - new release process implemented using Github actions
   - Specify the maintainer, for deb packages.
   - Updated to 0.1.56 release (jsc#ECO-3319)
     - Align ism_o profile with latest ISM SSP (#6878)
     - Align RHEL 7 STIG profile with DISA STIG V3R3
     - Creating new RHEL 7 STIG GUI profile (#6863)
     - Creating new RHEL 8 STIG GUI profile (#6862)
     - Add the RHEL9 product (#6801)
     - Initial support for SUSE SLE-15 (#6666)
     - add support for osbuild blueprint remediations (#6970)
   - Updated to a intermediate GIT snapshot of 20210323 (jsc#ECO-3319)
     - initial SLES15 STIG added
     - more SLES 12 STIG work
     - correct tables and cross references for SLES 12 and 15 STIG
   - Updated to 0.1.55 release (jsc#ECO-3319)
     - big update of rules used in SLES-12 STIG profile
     - Render policy to HTML (#6532)
     - Add variable support to yamlfile_value template (#6563)
     - Introduce new template for dconf configuration files (#6118)
   - Avoid some non sles12 sp2 available macros.

   spacecmd:

   - Version 4.3.4-1
     * Update translation strings
   - Version 4.3.3-1
     * Improved event history listing and added new system_eventdetails
       command to retrieve the details of an event
     * configchannel_updatefile handles directory properly (bsc#1190512)
   - Version 4.3.2-1
     * Add schedule_archivecompleted to mass archive actions (bsc#1181223)
     * Make schedule_deletearchived to get all actions without display limit
     * Allow passing a date limit for schedule_deletearchived on spacecmd
       (bsc#1181223)
     * Remove whoami from the list of unauthenticated commands (bsc#1188977)
   - Version 4.3.1-1
   - Use correct API endpoint in list_proxies (bsc#1188042)
   - Add schedule_deletearchived to bulk delete archived actions (bsc#1181223)
   - Make spacecmd aware of retracted patches/packages
   - Version 4.2.10-1
   - Enhance help for installation types when creating distributions
     (bsc#1186581)
   - Version 4.2.9-1
   - Parse empty argument when nothing in between the separator


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Manager Ubuntu 18.04-CLIENT-TOOLS-BETA:

      zypper in -t patch SUSE-Ubuntu-18.04-CLIENT-TOOLS-BETA-2021-3903=1



Package List:

   - SUSE Manager Ubuntu 18.04-CLIENT-TOOLS-BETA (all):

      python3-contextvars-2.4-1
      python3-immutables-0.11-1
      salt-common-3003.3+ds-1+27.45.1
      salt-minion-3003.3+ds-1+27.45.1
      scap-security-guide-ubuntu-0.1.58-2.6.1
      spacecmd-4.3.4-2.27.1


References:

   https://www.suse.com/security/cve/CVE-2021-21996.html
   https://bugzilla.suse.com/1164192
   https://bugzilla.suse.com/1167586
   https://bugzilla.suse.com/1168327
   https://bugzilla.suse.com/1173103
   https://bugzilla.suse.com/1173692
   https://bugzilla.suse.com/1180650
   https://bugzilla.suse.com/1181223
   https://bugzilla.suse.com/1184659
   https://bugzilla.suse.com/1185131
   https://bugzilla.suse.com/1186287
   https://bugzilla.suse.com/1186310
   https://bugzilla.suse.com/1186581
   https://bugzilla.suse.com/1186674
   https://bugzilla.suse.com/1186738
   https://bugzilla.suse.com/1187787
   https://bugzilla.suse.com/1187813
   https://bugzilla.suse.com/1188042
   https://bugzilla.suse.com/1188170
   https://bugzilla.suse.com/1188259
   https://bugzilla.suse.com/1188647
   https://bugzilla.suse.com/1188977
   https://bugzilla.suse.com/1189040
   https://bugzilla.suse.com/1190265
   https://bugzilla.suse.com/1190446
   https://bugzilla.suse.com/1190512
   https://bugzilla.suse.com/1191412
   https://bugzilla.suse.com/1191431



More information about the sle-updates mailing list