drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mangelnde Rechteprüfung in SUSE Manager Client Tools
Name: |
Mangelnde Rechteprüfung in SUSE Manager Client Tools |
|
ID: |
SUSE-SU-2022:3170-1 |
|
Distribution: |
SUSE |
|
Plattformen: |
SUSE Manager Debian 10-CLIENT-TOOLS |
|
Datum: |
Do, 8. September 2022, 21:59 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22967 |
|
Applikationen: |
SUSE Manager Client Tools |
|
Originalnachricht |
SUSE Security Update: Security update for SUSE Manager Client Tools ______________________________________________________________________________
Announcement ID: SUSE-SU-2022:3170-1 Rating: moderate References: #1195895 #1197288 #1198489 #1198744 #1199372 #1200163 #1200566 #1200591 #1201003 #1201082 #1202259 ECO-3319 Cross-References: CVE-2022-22967 CVSS scores: CVE-2022-22967 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVE-2022-22967 (SUSE): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products: SUSE Manager Debian 10-CLIENT-TOOLS ______________________________________________________________________________
An update that solves one vulnerability, contains one feature and has 10 fixes is now available.
Description:
This update fixes the following issues:
salt:
- Put missing dpkgnotify pkgset beacon plugin to the salt-minion package (bsc#1202259) - Add support for gpgautoimport in zypperpkg module - Update Salt to work with Jinja >= and <= 3.1.0 (bsc#1198744) - Fix salt.states.file.managed() for follow_symlinks=True and test=True (bsc#1199372) - Make Salt 3004 compatible with pyzmq >= 23.0.0 (bsc#1201082) - Add support for name, pkgs and diff_attr parameters to upgrade function for zypper and yum (bsc#1198489) - Fix ownership of salt thin directory when using the Salt Bundle - Set default target for pip from VENV_PIP_TARGET environment variable - Normalize package names once with pkg.installed/removed using yum (bsc#1195895) - Save log to logfile with docker.build - Use Salt Bundle in dockermod - Ignore erros on reading license files with dpkg_lowpkg (bsc#1197288) - Fix PAM auth issue due missing check for PAM_ACCT_MGM return value (CVE-2022-22967) (bsc#1200566)
scap-security-guide:
- Fix the build for RHEL 7 and clones (python-setuptools is used) - Fix the build for RHEL 9 and clones - convert one bash emitter to new jinja method. (bsc#1200163) - Add python3-setuptools for all builds (so it is also used on debian and centos flavors) - Updated to 0.1.62 (jsc#ECO-3319) - Update rhel8 stig to v1r6 - OL7 STIG v2r7 update - Initial definition of ANSSI BP28 minmal profile for SLE - Updated to 0.1.61 (jsc#ECO-3319) - Stop building PCI-DSS-centric XCCDF benchmark for RHEL 7 - Introduce OL9 product - Implement handling of logical expressions in platform definitions - Bump disk size constraints to 7gb to avoid occasional disk fulls failures.
spacecmd:
- Version 4.3.14-1 * Fix missing argument on system_listmigrationtargets (bsc#1201003) * Show correct help on calling kickstart_importjson with no arguments * Fix tracebacks on spacecmd kickstart_export (bsc#1200591) * Change proxy container config default filename to end with tar.gz * Update translation strings
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- SUSE Manager Debian 10-CLIENT-TOOLS:
zypper in -t patch SUSE-Debian-10-CLIENT-TOOLS-x86_64-2022-3170=1
Package List:
- SUSE Manager Debian 10-CLIENT-TOOLS (all):
salt-common-3004+ds-1+2.61.1 salt-minion-3004+ds-1+2.61.1 scap-security-guide-debian-0.1.62-2.21.1 spacecmd-4.3.14-2.33.1
References:
https://www.suse.com/security/cve/CVE-2022-22967.html https://bugzilla.suse.com/1195895 https://bugzilla.suse.com/1197288 https://bugzilla.suse.com/1198489 https://bugzilla.suse.com/1198744 https://bugzilla.suse.com/1199372 https://bugzilla.suse.com/1200163 https://bugzilla.suse.com/1200566 https://bugzilla.suse.com/1200591 https://bugzilla.suse.com/1201003 https://bugzilla.suse.com/1201082 https://bugzilla.suse.com/1202259
|
|
|
|