<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for SUSE Manager Client Tools</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2025:20124-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2025-02-13T08:38:09Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-02-13T08:38:09Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-02-13T08:38:09Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for SUSE Manager Client Tools</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update fixes the following issues:

salt:

- Revert setting SELinux context for minion service (bsc#1233667)
- Removed System V init support
- Fix the condition of alternatives for Tumbleweed and Leap 16
- Build all python bindings for all flavors
- Make minion reconnecting on changing master IP (bsc#1228182)
- Handle logger exception when flushing already closed file
- Include passlib as a recommended dependency
- Make Salt Bundle more tolerant to long running jobs (bsc#1228690)

uyuni-tools was updated from version 0.1.23-0 to 0.1.27-0:

- Security issues fixed:
  * CVE-2024-22037: Use podman secret to store the database credentials (bsc#1231497)
- Other changes and bugs fixed:
  * Version 0.1.27-0
    + Bump the default image tag to 5.0.3
    + IsInstalled function fix
    + Run systemctl daemon-reload after changing the container image config (bsc#1233279)
    + Coco-replicas-upgrade
    + Persist search server indexes (bsc#1231759)
    + Sync deletes files during migration (bsc#1233660)
    + Ignore coco and hub images when applying PTF if they are not ailable (bsc#1229079)
    + Add --registry back to mgrpxy (bsc#1233202)
    + Only add java.hostname on migrated server if not present
    + Consider the configuration file to detect the coco or hub api images should be pulled (bsc#1229104)
    + Only raise an error if cloudguestregistryauth fails for PAYG (bsc#1233630)
    + Add registry.suse.com login to mgradm upgrade podman list (bsc#1234123)
  * Version 0.1.26-0
    + Ignore all zypper caches during migration (bsc#1232769)
    + Use the uyuni network for all podman containers (bsc#1232817)
  * Version 0.1.25-0
    + Don't migrate enabled systemd services, recreate them (bsc#1232575)
  * Version 0.1.24-0
    + Redact JSESSIONID and pxt-session-cookie values from logs and
      console output (bsc#1231568)

venv-salt-minion:
    
- Included D-Bus python module for SUSE distros (bsc#1231618)
- Reverted setting SELinux context for minion service (bsc#1233667)
- Make minion reconnecting on changing master IP (bsc#1228182)
- Fixed post_start_cleanup.sh shebang to work on all systems
- Handle logger exception when flushing already closed file
- Made Salt Bundle more tolerant to long running jobs (bsc#1228690)
- Modified:
  * include-rpm
  * filter-requires.sh
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-SLE-Micro-6.0-211</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202520124-1/</URL>
      <Description>Link for SUSE-SU-2025:20124-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2025-June/021205.html</URL>
      <Description>E-Mail link for SUSE-SU-2025:20124-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228182</URL>
      <Description>SUSE Bug 1228182</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228690</URL>
      <Description>SUSE Bug 1228690</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1229079</URL>
      <Description>SUSE Bug 1229079</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1229104</URL>
      <Description>SUSE Bug 1229104</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231497</URL>
      <Description>SUSE Bug 1231497</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231568</URL>
      <Description>SUSE Bug 1231568</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231618</URL>
      <Description>SUSE Bug 1231618</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1231759</URL>
      <Description>SUSE Bug 1231759</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232575</URL>
      <Description>SUSE Bug 1232575</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232769</URL>
      <Description>SUSE Bug 1232769</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1232817</URL>
      <Description>SUSE Bug 1232817</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233202</URL>
      <Description>SUSE Bug 1233202</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233279</URL>
      <Description>SUSE Bug 1233279</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233630</URL>
      <Description>SUSE Bug 1233630</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233660</URL>
      <Description>SUSE Bug 1233660</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233667</URL>
      <Description>SUSE Bug 1233667</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234123</URL>
      <Description>SUSE Bug 1234123</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-22037/</URL>
      <Description>SUSE CVE CVE-2024-22037 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Micro 6.0">
      <Branch Type="Product Name" Name="SUSE Linux Micro 6.0">
        <FullProductName ProductID="SUSE Linux Micro 6.0" CPE="cpe:/o:suse:sl-micro:6.0">SUSE Linux Micro 6.0</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="python311-salt-3006.0-9.1">
      <FullProductName ProductID="python311-salt-3006.0-9.1">python311-salt-3006.0-9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="salt-3006.0-9.1">
      <FullProductName ProductID="salt-3006.0-9.1">salt-3006.0-9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="salt-master-3006.0-9.1">
      <FullProductName ProductID="salt-master-3006.0-9.1">salt-master-3006.0-9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="salt-minion-3006.0-9.1">
      <FullProductName ProductID="salt-minion-3006.0-9.1">salt-minion-3006.0-9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="salt-transactional-update-3006.0-9.1">
      <FullProductName ProductID="salt-transactional-update-3006.0-9.1">salt-transactional-update-3006.0-9.1</FullProductName>
    </Branch>
    <Relationship ProductReference="python311-salt-3006.0-9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Micro 6.0">
      <FullProductName ProductID="SUSE Linux Micro 6.0:python311-salt-3006.0-9.1">python311-salt-3006.0-9.1 as a component of SUSE Linux Micro 6.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="salt-3006.0-9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Micro 6.0">
      <FullProductName ProductID="SUSE Linux Micro 6.0:salt-3006.0-9.1">salt-3006.0-9.1 as a component of SUSE Linux Micro 6.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="salt-master-3006.0-9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Micro 6.0">
      <FullProductName ProductID="SUSE Linux Micro 6.0:salt-master-3006.0-9.1">salt-master-3006.0-9.1 as a component of SUSE Linux Micro 6.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="salt-minion-3006.0-9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Micro 6.0">
      <FullProductName ProductID="SUSE Linux Micro 6.0:salt-minion-3006.0-9.1">salt-minion-3006.0-9.1 as a component of SUSE Linux Micro 6.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="salt-transactional-update-3006.0-9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Micro 6.0">
      <FullProductName ProductID="SUSE Linux Micro 6.0:salt-transactional-update-3006.0-9.1">salt-transactional-update-3006.0-9.1 as a component of SUSE Linux Micro 6.0</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The uyuni-server-attestation systemd service needs a database_password environment variable. This file has 640 permission, and cannot be shown users, but the environment is still exposed by systemd to non-privileged users.</Note>
    </Notes>
    <CVE>CVE-2024-22037</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Micro 6.0:python311-salt-3006.0-9.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:salt-3006.0-9.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:salt-master-3006.0-9.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:salt-minion-3006.0-9.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:salt-transactional-update-3006.0-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202520124-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-22037.html</URL>
        <Description>CVE-2024-22037</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1231497</URL>
        <Description>SUSE Bug 1231497</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
