Login
Newsletter
Werbung

Sicherheit: Ausführen beliebiger Kommandos in SUSE Manager Client Tools
Aktuelle Meldungen Distributionen
Name: Ausführen beliebiger Kommandos in SUSE Manager Client Tools
ID: SUSE-SU-2021:3549-1
Distribution: SUSE
Plattformen: SUSE Manager Debian 10-CLIENT-TOOLS
Datum: Mi, 27. Oktober 2021, 22:51
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21996
Applikationen: SUSE Manager Client Tools

Originalnachricht


SUSE Security Update: Security update for SUSE Manager Client Tools
______________________________________________________________________________

Announcement ID: SUSE-SU-2021:3549-1
Rating: moderate
References: #1181223 #1188977 #1190265 #1190512 ECO-3319

Cross-References: CVE-2021-21996
CVSS scores:
CVE-2021-21996 (SUSE): 4.2
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L

Affected Products:
SUSE Manager Debian 10-CLIENT-TOOLS
______________________________________________________________________________

An update that solves one vulnerability, contains one
feature and has three fixes is now available.

Description:

This update fixes the following issues:

salt:

- Support querying for JSON data in external sql pillar
- Exclude the full path of a download URL to prevent injection of
malicious code (bsc#1190265, CVE-2021-21996)
- Fix wrong relative paths resolution with Jinja renderer when importing
subdirectories

scap-security-guide:

- Updated to 0.1.57 release (jsc#ECO-3319)
- CIS profile for RHEL 7 is updated
- initial CIS profiles for Ubuntu 20.04
- Major improvement of RHEL 9 content
- new release process implemented using Github actions

spacecmd:

- Version 4.2.13-1
* Update translation strings
* configchannel_updatefile handles directory properly (bsc#1190512)
* Add schedule_archivecompleted to mass archive actions (bsc#1181223)
* Remove whoami from the list of unauthenticated commands (bsc#1188977)


Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- SUSE Manager Debian 10-CLIENT-TOOLS:

zypper in -t patch SUSE-Debian-10-CLIENT-TOOLS-x86_64-2021-3549=1



Package List:

- SUSE Manager Debian 10-CLIENT-TOOLS (all):

salt-common-3002.2+ds-1+2.36.1
salt-minion-3002.2+ds-1+2.36.1
scap-security-guide-debian-0.1.57-2.9.1
spacecmd-4.2.13-2.18.1


References:

https://www.suse.com/security/cve/CVE-2021-21996.html
https://bugzilla.suse.com/1181223
https://bugzilla.suse.com/1188977
https://bugzilla.suse.com/1190265
https://bugzilla.suse.com/1190512
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung