<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for SUSE Manager Salt Bundle</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2023:3877-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2023-09-28T11:47:21Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2023-09-28T11:47:21Z</InitialReleaseDate>
    <CurrentReleaseDate>2023-09-28T11:47:21Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for SUSE Manager Salt Bundle</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update fixes the following issues:

venv-salt-minion:

- Security issues fixed:  
  * CVE-2023-20897: Do not fail on bad message pack message (bsc#1213441)  
  * CVE-2023-20898: Fixed Git Providers can read from the wrong environment because they get the same cache directory
    base name. (bsc#1214797, bsc#1193948)
- Bugs fixed:
  * Revert usage of long running REQ channel to prevent possible missing responses on requests and duplicated
    responses (bsc#1213960, bsc#1213630, bsc#1213257)
  * Create minion_id with reproducible mtime
  * Do not recompile SELinux policy module on building. Use precompiled module instead to avoid incompatibility errors.
  * Fix broken tests to make them running in the testsuite
  * Fix detection of Salt codename by 'salt_version' execution module
  * Fix inconsistency in reported version by egg-info metadata (bsc#1215489)
  * Fix regression: multiple values for keyword argument 'saltenv' (bsc#1212844)
  * Fix the regression of user.present state when group is unset (bsc#1212855)
  * Fix utf8 handling in 'pass' renderer and make it more robust
  * Fix zypper repositories always being reconfigured
  * Make sure configured user is properly set by Salt (bsc#1210994)
  * Prevent possible exceptions on salt.utils.user.get_group_dict (bsc#1212794)
  * Ship SELinux policy module version 19 to make it compatible with broader list of Linux distributions
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2023-3877,SUSE-SLE-Manager-Tools-15-2023-3877,SUSE-SLE-Manager-Tools-For-Micro-5-2023-3877,SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2023-3877,SUSE-SLE-Module-SUSE-Manager-Server-4.3-2023-3877</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20233877-1/</URL>
      <Description>Link for SUSE-SU-2023:3877-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-updates/2023-September/031782.html</URL>
      <Description>E-Mail link for SUSE-SU-2023:3877-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1193948</URL>
      <Description>SUSE Bug 1193948</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1210994</URL>
      <Description>SUSE Bug 1210994</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1212794</URL>
      <Description>SUSE Bug 1212794</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1212844</URL>
      <Description>SUSE Bug 1212844</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1212855</URL>
      <Description>SUSE Bug 1212855</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213257</URL>
      <Description>SUSE Bug 1213257</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213441</URL>
      <Description>SUSE Bug 1213441</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213630</URL>
      <Description>SUSE Bug 1213630</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213960</URL>
      <Description>SUSE Bug 1213960</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1214796</URL>
      <Description>SUSE Bug 1214796</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1214797</URL>
      <Description>SUSE Bug 1214797</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1215489</URL>
      <Description>SUSE Bug 1215489</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-20897/</URL>
      <Description>SUSE CVE CVE-2023-20897 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-20898/</URL>
      <Description>SUSE CVE CVE-2023-20898 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Manager Client Tools 15">
      <Branch Type="Product Name" Name="SUSE Manager Client Tools 15">
        <FullProductName ProductID="SUSE Manager Client Tools 15">SUSE Manager Client Tools 15</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Manager Client Tools for SLE Micro 5">
      <Branch Type="Product Name" Name="SUSE Manager Client Tools for SLE Micro 5">
        <FullProductName ProductID="SUSE Manager Client Tools for SLE Micro 5" CPE="cpe:/o:suse:sle-manager-tools-micro:5">SUSE Manager Client Tools for SLE Micro 5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Manager Proxy Module 4.3">
      <Branch Type="Product Name" Name="SUSE Manager Proxy Module 4.3">
        <FullProductName ProductID="SUSE Manager Proxy Module 4.3" CPE="cpe:/o:suse:sle-module-suse-manager-proxy:4.3">SUSE Manager Proxy Module 4.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Manager Server Module 4.3">
      <Branch Type="Product Name" Name="SUSE Manager Server Module 4.3">
        <FullProductName ProductID="SUSE Manager Server Module 4.3" CPE="cpe:/o:suse:sle-module-suse-manager-server:4.3">SUSE Manager Server Module 4.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="saltbundle-libsodium-1.0.18-150000.3.12.3">
      <FullProductName ProductID="saltbundle-libsodium-1.0.18-150000.3.12.3">saltbundle-libsodium-1.0.18-150000.3.12.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundle-libsodium-devel-1.0.18-150000.3.12.3">
      <FullProductName ProductID="saltbundle-libsodium-devel-1.0.18-150000.3.12.3">saltbundle-libsodium-devel-1.0.18-150000.3.12.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundle-libzmq-4.2.3-150000.3.12.3">
      <FullProductName ProductID="saltbundle-libzmq-4.2.3-150000.3.12.3">saltbundle-libzmq-4.2.3-150000.3.12.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundle-zeromq-devel-4.2.3-150000.3.12.3">
      <FullProductName ProductID="saltbundle-zeromq-devel-4.2.3-150000.3.12.3">saltbundle-zeromq-devel-4.2.3-150000.3.12.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundle-zeromq-tools-4.2.3-150000.3.12.3">
      <FullProductName ProductID="saltbundle-zeromq-tools-4.2.3-150000.3.12.3">saltbundle-zeromq-tools-4.2.3-150000.3.12.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-3.10.10-150000.3.18.3">
      <FullProductName ProductID="saltbundlepy-3.10.10-150000.3.18.3">saltbundlepy-3.10.10-150000.3.18.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-base-3.10.10-150000.3.18.4">
      <FullProductName ProductID="saltbundlepy-base-3.10.10-150000.3.18.4">saltbundlepy-base-3.10.10-150000.3.18.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-cffi-1.15.1-150000.3.12.3">
      <FullProductName ProductID="saltbundlepy-cffi-1.15.1-150000.3.12.3">saltbundlepy-cffi-1.15.1-150000.3.12.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-cryptography-3.3.2-150000.3.18.3">
      <FullProductName ProductID="saltbundlepy-cryptography-3.3.2-150000.3.18.3">saltbundlepy-cryptography-3.3.2-150000.3.18.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-cryptography-vectors-3.3.2-150000.3.12.1">
      <FullProductName ProductID="saltbundlepy-cryptography-vectors-3.3.2-150000.3.12.1">saltbundlepy-cryptography-vectors-3.3.2-150000.3.12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-curses-3.10.10-150000.3.18.3">
      <FullProductName ProductID="saltbundlepy-curses-3.10.10-150000.3.18.3">saltbundlepy-curses-3.10.10-150000.3.18.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-cython-0.29.32-150000.3.12.3">
      <FullProductName ProductID="saltbundlepy-cython-0.29.32-150000.3.12.3">saltbundlepy-cython-0.29.32-150000.3.12.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-dbm-3.10.10-150000.3.18.3">
      <FullProductName ProductID="saltbundlepy-dbm-3.10.10-150000.3.18.3">saltbundlepy-dbm-3.10.10-150000.3.18.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-devel-3.10.10-150000.3.18.4">
      <FullProductName ProductID="saltbundlepy-devel-3.10.10-150000.3.18.4">saltbundlepy-devel-3.10.10-150000.3.18.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-kiwi-9.24.43-150000.3.15.1">
      <FullProductName ProductID="saltbundlepy-kiwi-9.24.43-150000.3.15.1">saltbundlepy-kiwi-9.24.43-150000.3.15.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-libs-3.10.10-150000.3.18.4">
      <FullProductName ProductID="saltbundlepy-libs-3.10.10-150000.3.18.4">saltbundlepy-libs-3.10.10-150000.3.18.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-lxml-4.9.2-150000.3.15.3">
      <FullProductName ProductID="saltbundlepy-lxml-4.9.2-150000.3.15.3">saltbundlepy-lxml-4.9.2-150000.3.15.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-lxml-devel-4.9.2-150000.3.15.3">
      <FullProductName ProductID="saltbundlepy-lxml-devel-4.9.2-150000.3.15.3">saltbundlepy-lxml-devel-4.9.2-150000.3.15.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-lxml-doc-4.9.2-150000.3.15.3">
      <FullProductName ProductID="saltbundlepy-lxml-doc-4.9.2-150000.3.15.3">saltbundlepy-lxml-doc-4.9.2-150000.3.15.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-pycparser-2.17-150000.3.9.1">
      <FullProductName ProductID="saltbundlepy-pycparser-2.17-150000.3.9.1">saltbundlepy-pycparser-2.17-150000.3.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-pytz-2022.1-150000.3.12.3">
      <FullProductName ProductID="saltbundlepy-pytz-2022.1-150000.3.12.3">saltbundlepy-pytz-2022.1-150000.3.12.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-pyxattr-0.7.2-150000.3.9.3">
      <FullProductName ProductID="saltbundlepy-pyxattr-0.7.2-150000.3.9.3">saltbundlepy-pyxattr-0.7.2-150000.3.9.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-pyzmq-24.0.1-150000.3.18.3">
      <FullProductName ProductID="saltbundlepy-pyzmq-24.0.1-150000.3.18.3">saltbundlepy-pyzmq-24.0.1-150000.3.18.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-pyzmq-devel-24.0.1-150000.3.18.3">
      <FullProductName ProductID="saltbundlepy-pyzmq-devel-24.0.1-150000.3.18.3">saltbundlepy-pyzmq-devel-24.0.1-150000.3.18.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-rpm-generators-20211001.fc6c04e-150000.3.9.1">
      <FullProductName ProductID="saltbundlepy-rpm-generators-20211001.fc6c04e-150000.3.9.1">saltbundlepy-rpm-generators-20211001.fc6c04e-150000.3.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-rpm-macros-20211001.fc6c04e-150000.3.9.1">
      <FullProductName ProductID="saltbundlepy-rpm-macros-20211001.fc6c04e-150000.3.9.1">saltbundlepy-rpm-macros-20211001.fc6c04e-150000.3.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-testsuite-3.10.10-150000.3.18.4">
      <FullProductName ProductID="saltbundlepy-testsuite-3.10.10-150000.3.18.4">saltbundlepy-testsuite-3.10.10-150000.3.18.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-tk-3.10.10-150000.3.18.3">
      <FullProductName ProductID="saltbundlepy-tk-3.10.10-150000.3.18.3">saltbundlepy-tk-3.10.10-150000.3.18.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="saltbundlepy-tools-3.10.10-150000.3.18.4">
      <FullProductName ProductID="saltbundlepy-tools-3.10.10-150000.3.18.4">saltbundlepy-tools-3.10.10-150000.3.18.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="venv-salt-minion-3006.0-150000.3.42.1">
      <FullProductName ProductID="venv-salt-minion-3006.0-150000.3.42.1">venv-salt-minion-3006.0-150000.3.42.1</FullProductName>
    </Branch>
    <Relationship ProductReference="venv-salt-minion-3006.0-150000.3.42.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools 15">
      <FullProductName ProductID="SUSE Manager Client Tools 15:venv-salt-minion-3006.0-150000.3.42.1">venv-salt-minion-3006.0-150000.3.42.1 as a component of SUSE Manager Client Tools 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="venv-salt-minion-3006.0-150000.3.42.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Client Tools for SLE Micro 5">
      <FullProductName ProductID="SUSE Manager Client Tools for SLE Micro 5:venv-salt-minion-3006.0-150000.3.42.1">venv-salt-minion-3006.0-150000.3.42.1 as a component of SUSE Manager Client Tools for SLE Micro 5</FullProductName>
    </Relationship>
    <Relationship ProductReference="venv-salt-minion-3006.0-150000.3.42.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Proxy Module 4.3">
      <FullProductName ProductID="SUSE Manager Proxy Module 4.3:venv-salt-minion-3006.0-150000.3.42.1">venv-salt-minion-3006.0-150000.3.42.1 as a component of SUSE Manager Proxy Module 4.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="venv-salt-minion-3006.0-150000.3.42.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Server Module 4.3">
      <FullProductName ProductID="SUSE Manager Server Module 4.3:venv-salt-minion-3006.0-150000.3.42.1">venv-salt-minion-3006.0-150000.3.42.1 as a component of SUSE Manager Server Module 4.3</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Salt masters prior to 3005.2 or 3006.2 contain a DOS in minion return. After receiving several bad packets on the request server equal to the number of worker threads, the master will become unresponsive to return requests until restarted.
</Note>
    </Notes>
    <CVE>CVE-2023-20897</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Manager Client Tools 15:venv-salt-minion-3006.0-150000.3.42.1</ProductID>
        <ProductID>SUSE Manager Client Tools for SLE Micro 5:venv-salt-minion-3006.0-150000.3.42.1</ProductID>
        <ProductID>SUSE Manager Proxy Module 4.3:venv-salt-minion-3006.0-150000.3.42.1</ProductID>
        <ProductID>SUSE Manager Server Module 4.3:venv-salt-minion-3006.0-150000.3.42.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20233877-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-20897.html</URL>
        <Description>CVE-2023-20897</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1214796</URL>
        <Description>SUSE Bug 1214796</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Git Providers can read from the wrong environment because they get the same cache directory base name in Salt masters prior to 3005.2 or 3006.2. Anything that uses Git Providers with different environments can get garbage data or the wrong data, which can lead to wrongful data disclosure, wrongful executions, data corruption and/or crash.
</Note>
    </Notes>
    <CVE>CVE-2023-20898</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Manager Client Tools 15:venv-salt-minion-3006.0-150000.3.42.1</ProductID>
        <ProductID>SUSE Manager Client Tools for SLE Micro 5:venv-salt-minion-3006.0-150000.3.42.1</ProductID>
        <ProductID>SUSE Manager Proxy Module 4.3:venv-salt-minion-3006.0-150000.3.42.1</ProductID>
        <ProductID>SUSE Manager Server Module 4.3:venv-salt-minion-3006.0-150000.3.42.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20233877-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-20898.html</URL>
        <Description>CVE-2023-20898</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1214797</URL>
        <Description>SUSE Bug 1214797</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
