<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Recommended update for SUSE Manager 4.2.3 Release Notes</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-RU-2021:3551-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2021-10-27T13:28:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2021-10-27T13:28:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2021-10-27T13:28:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Recommended update for SUSE Manager 4.2.3 Release Notes</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for SUSE Manager 4.2.3 Release Notes provides the following additions:

Release notes for SUSE Manager:

- Update to 4.2.3 
  - aarch64 support for CentOS 7/8, Oracle Linux 7/8, Rocky Linux 8, AlmaLinux 8, Amazon Linux 2 and openSUSE Leap 15.3
  - Package Locking features is now available for Salt Minions
  - New XMLRPC API methods for SaltKey
  - Bugs mentioned:
    bsc#1171520, bsc#1181223, bsc#1187572, bsc#1187998, 
    bsc#1188315, bsc#1188977, bsc#1189260, bsc#1189422, 
    bsc#1189609, bsc#1189799, bsc#1189818, bsc#1189933, 
    bsc#1190040, bsc#1190123, bsc#1190151, bsc#1190164, 
    bsc#1190166, bsc#1190265, bsc#1190275, bsc#1190276, 
    bsc#1190300, bsc#1190396, bsc#1190405, bsc#1190455, 
    bsc#1190512, bsc#1190602, bsc#1190751, bsc#1190820, 
    bsc#1191123, bsc#1191139, bsc#1191348, bsc#1191551, 
    CVE-2021-40348, CVE-2021-21996

Release notes for SUSE Manager proxy:

- Update to 4.2.3
  - Bugs mentioned:
    bsc#1171520, bsc#1181223, bsc#1187998, bsc#1188315,
    bsc#1188977, bsc#1190405, bsc#1190512, bsc#1190602,
    bsc#1190751, bsc#1190820, bsc#1191348
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2021-3551,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2021-3551,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.2-2021-3551,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2021-3551</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/-2021-3551/suse-ru-20213551-1/</URL>
      <Description>Link for SUSE-RU-2021:3551-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-updates/2021-October/020641.html</URL>
      <Description>E-Mail link for SUSE-RU-2021:3551-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1171520</URL>
      <Description>SUSE Bug 1171520</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1181223</URL>
      <Description>SUSE Bug 1181223</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1187572</URL>
      <Description>SUSE Bug 1187572</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1187998</URL>
      <Description>SUSE Bug 1187998</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1188315</URL>
      <Description>SUSE Bug 1188315</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1188977</URL>
      <Description>SUSE Bug 1188977</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1189260</URL>
      <Description>SUSE Bug 1189260</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1189422</URL>
      <Description>SUSE Bug 1189422</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1189609</URL>
      <Description>SUSE Bug 1189609</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1189799</URL>
      <Description>SUSE Bug 1189799</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1189818</URL>
      <Description>SUSE Bug 1189818</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1189933</URL>
      <Description>SUSE Bug 1189933</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1190040</URL>
      <Description>SUSE Bug 1190040</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1190123</URL>
      <Description>SUSE Bug 1190123</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1190151</URL>
      <Description>SUSE Bug 1190151</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1190164</URL>
      <Description>SUSE Bug 1190164</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1190166</URL>
      <Description>SUSE Bug 1190166</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1190265</URL>
      <Description>SUSE Bug 1190265</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1190275</URL>
      <Description>SUSE Bug 1190275</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1190276</URL>
      <Description>SUSE Bug 1190276</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1190300</URL>
      <Description>SUSE Bug 1190300</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1190396</URL>
      <Description>SUSE Bug 1190396</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1190405</URL>
      <Description>SUSE Bug 1190405</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1190455</URL>
      <Description>SUSE Bug 1190455</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1190512</URL>
      <Description>SUSE Bug 1190512</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1190602</URL>
      <Description>SUSE Bug 1190602</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1190751</URL>
      <Description>SUSE Bug 1190751</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1190820</URL>
      <Description>SUSE Bug 1190820</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1191123</URL>
      <Description>SUSE Bug 1191123</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1191139</URL>
      <Description>SUSE Bug 1191139</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1191348</URL>
      <Description>SUSE Bug 1191348</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1191551</URL>
      <Description>SUSE Bug 1191551</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-21996/</URL>
      <Description>SUSE CVE CVE-2021-21996 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-40348/</URL>
      <Description>SUSE CVE CVE-2021-40348 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Manager Proxy 4.2">
      <Branch Type="Product Name" Name="SUSE Manager Proxy 4.2">
        <FullProductName ProductID="SUSE Manager Proxy 4.2" CPE="cpe:/o:suse:suse-manager-proxy:4.2">SUSE Manager Proxy 4.2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Manager Retail Branch Server 4.2">
      <Branch Type="Product Name" Name="SUSE Manager Retail Branch Server 4.2">
        <FullProductName ProductID="SUSE Manager Retail Branch Server 4.2" CPE="cpe:/o:suse:suse-manager-retail-branch-server:4.2">SUSE Manager Retail Branch Server 4.2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Manager Server 4.2">
      <Branch Type="Product Name" Name="SUSE Manager Server 4.2">
        <FullProductName ProductID="SUSE Manager Server 4.2" CPE="cpe:/o:suse:suse-manager-server:4.2">SUSE Manager Server 4.2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="release-notes-susemanager-4.2.3-3.19.1">
      <FullProductName ProductID="release-notes-susemanager-4.2.3-3.19.1">release-notes-susemanager-4.2.3-3.19.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="release-notes-susemanager-proxy-4.2.3-3.15.1">
      <FullProductName ProductID="release-notes-susemanager-proxy-4.2.3-3.15.1">release-notes-susemanager-proxy-4.2.3-3.15.1</FullProductName>
    </Branch>
    <Relationship ProductReference="release-notes-susemanager-proxy-4.2.3-3.15.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Proxy 4.2">
      <FullProductName ProductID="SUSE Manager Proxy 4.2:release-notes-susemanager-proxy-4.2.3-3.15.1">release-notes-susemanager-proxy-4.2.3-3.15.1 as a component of SUSE Manager Proxy 4.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="release-notes-susemanager-proxy-4.2.3-3.15.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Retail Branch Server 4.2">
      <FullProductName ProductID="SUSE Manager Retail Branch Server 4.2:release-notes-susemanager-proxy-4.2.3-3.15.1">release-notes-susemanager-proxy-4.2.3-3.15.1 as a component of SUSE Manager Retail Branch Server 4.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="release-notes-susemanager-4.2.3-3.19.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Server 4.2">
      <FullProductName ProductID="SUSE Manager Server 4.2:release-notes-susemanager-4.2.3-3.19.1">release-notes-susemanager-4.2.3-3.19.1 as a component of SUSE Manager Server 4.2</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in SaltStack Salt before 3003.3. A user who has control of the source, and source_hash URLs can gain full file system access as root on a salt minion.</Note>
    </Notes>
    <CVE>CVE-2021-21996</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Manager Proxy 4.2:release-notes-susemanager-proxy-4.2.3-3.15.1</ProductID>
        <ProductID>SUSE Manager Retail Branch Server 4.2:release-notes-susemanager-proxy-4.2.3-3.15.1</ProductID>
        <ProductID>SUSE Manager Server 4.2:release-notes-susemanager-4.2.3-3.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.1</BaseScore>
        <Vector>AV:N/AC:H/Au:S/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/-2021-3551/suse-ru-20213551-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-21996.html</URL>
        <Description>CVE-2021-21996</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1190265</URL>
        <Description>SUSE Bug 1190265</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1210934</URL>
        <Description>SUSE Bug 1210934</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Spacewalk 2.10, and derivatives such as Uyuni 2021.08, allows code injection. rhn-config-satellite.pl doesn't sanitize the configuration filename used to append Spacewalk-specific key-value pair. The script is intended to be run by the tomcat user account with Sudo, according to the installation setup. This can lead to the ability of an attacker to use --option to append arbitrary code to a root-owned file that eventually will be executed by the system. This is fixed in Uyuni spacewalk-admin 4.3.2-1.</Note>
    </Notes>
    <CVE>CVE-2021-40348</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Manager Proxy 4.2:release-notes-susemanager-proxy-4.2.3-3.15.1</ProductID>
        <ProductID>SUSE Manager Retail Branch Server 4.2:release-notes-susemanager-proxy-4.2.3-3.15.1</ProductID>
        <ProductID>SUSE Manager Server 4.2:release-notes-susemanager-4.2.3-3.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/-2021-3551/suse-ru-20213551-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-40348.html</URL>
        <Description>CVE-2021-40348</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1190040</URL>
        <Description>SUSE Bug 1190040</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
