File _patchinfo of Package patchinfo.28021
<patchinfo incident="28021">
<rating>important</rating>
<packager>juliogonzalezgil</packager>
<category>security</category>
<summary>Security update for SUSE Manager Client Tools</summary>
<description>
This update fixes the following issues:
dracut-saltboot:
- Update to verion 0.1.1674034019.a93ff61
* Install copied wicked config as client.xml (bsc#1205599)
- Update to version 0.1.1673279145.e7616bd
grafana:
- CVE-2022-46146: Fix basic authentication bypass by updating the exporter
toolkit to version 0.7.3 (bsc#1208065,)
- CVE-2022-41723: Require Go 1.19 or newer (bsc#1208293)
- Update to version 8.5.20:
* CVE-2022-23552: Security: SVG: Add dompurify preprocessor step (bsc#1207749)
* CVE-2022-39324: Security: Snapshots: Fix originalUrl spoof security issue
(bsc#1207750)
* Security: Omit error from http response
* Bug fix: Email and username trimming and invitation validation
spacecmd:
- Version 4.3.19-1
* Fix spacecmd not showing any output for softwarechannel_diff
and softwarechannel_errata_diff (bsc#1207352)
* Prevent string api parameters to be parsed as dates if not in
ISO-8601 format (bsc#1205759)
spacewalk-client-tools:
- Version 4.3.15-1
* Update translation strings
supportutils-plugin-salt:
- Update to version 1.2.2
* Remove possible passwords from Salt configuration files (bsc#1201059)
uyuni-proxy-systemd-services:
- Version 4.3.8-1
* Allow using container images from different registry paths
</description>
<issue tracker="bnc" id="1201059">SUSE Manager database password captured in clear text by several supportconfig plugins</issue>
<issue tracker="bnc" id="1205599">minion fails on saltboot using dhcp server from Windows machine</issue>
<issue tracker="bnc" id="1205759">Fix for Bug 1198903 introduces new issue with spacecmd api calls</issue>
<issue tracker="bnc" id="1207352">spacecmd: no output shown for softwarechannel_diff or softwarechannel_errata_diff</issue>
<issue tracker="bnc" id="1207749">VUL-0: CVE-2022-23552: grafana: Grafana is an open-source platform for monitoring and observability. Starting with the 8.1 branch and prior to versions 8.5.16, 9.2.10, and 9.3.4, Grafana had a stored XSS vulnerability affecting the core plu</issue>
<issue tracker="bnc" id="1207750">VUL-0: CVE-2022-39324: grafana: Grafana is an open-source platform for monitoring and observability. Prior to versions 8.5.16 and 9.2.8, malicious user can create a snapshot and arbitrarily choose the `originalUrl` parameter by editing the</issue>
<issue tracker="bnc" id="1208065">VUL-0: CVE-2022-46146: grafana: prometheus/exporter-toolkit: authentication bypass via cache poisoning</issue>
<issue tracker="bnc" id="1208293">VUL-0: CVE-2022-41723: grafana: go1.19,go1.20: net/http: avoid quadratic complexity in HPACK decoding</issue>
<issue tracker="cve" id="2022-46146"/>
<issue tracker="cve" id="2022-41723"/>
<issue tracker="cve" id="2022-23552"/>
<issue tracker="cve" id="2022-39324"/>
</patchinfo>