Security update for salt
Announcement ID: | SUSE-SU-2021:0628-1 |
---|---|
Rating: | critical |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves 10 vulnerabilities and has two security fixes can now be installed.
Description:
This update for salt fixes the following issues:
- Fix regression on cmd.run when passing tuples as cmd (bsc#1182740)
- Allow
extra_filerefs
as sanitizedkwargs
for SSH client - Fix errors with virt.update
- Fix for multiple for security issues (CVE-2020-28243) (CVE-2020-28972) (CVE-2020-35662) (CVE-2021-3148) (CVE-2021-3144) (CVE-2021-25281) (CVE-2021-25282) (CVE-2021-25283) (CVE-2021-25284) (CVE-2021-3197) (bsc#1181550) (bsc#1181556) (bsc#1181557) (bsc#1181558) (bsc#1181559) (bsc#1181560) (bsc#1181561) (bsc#1181562) (bsc#1181563) (bsc#1181564) (bsc#1181565)
- virt: search for
grub.xen
path - Xen spicevmc, DNS SRV records backports:
- Fix virtual network generated DNS XML for SRV records
- Don't add spicevmc channel to xen VMs
- virt UEFI fix: virt.update when
efi=True
Special Instructions and Notes:
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Server ESPOS 15
zypper in -t patch SUSE-SLE-Product-HPC-15-2021-628=1
-
SUSE Linux Enterprise High Performance Computing 15 LTSS 15
zypper in -t patch SUSE-SLE-Product-HPC-15-2021-628=1
-
SUSE Linux Enterprise Server 15 LTSS 15
zypper in -t patch SUSE-SLE-Product-SLES-15-2021-628=1
-
SUSE Linux Enterprise Server for SAP Applications 15
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-2021-628=1
Package List:
-
SUSE Linux Enterprise Server ESPOS 15 (aarch64 x86_64)
- salt-minion-3000-5.106.1
- salt-ssh-3000-5.106.1
- salt-standalone-formulas-configuration-3000-5.106.1
- python3-salt-3000-5.106.1
- salt-3000-5.106.1
- salt-cloud-3000-5.106.1
- python2-salt-3000-5.106.1
- salt-doc-3000-5.106.1
- salt-master-3000-5.106.1
- salt-api-3000-5.106.1
- salt-proxy-3000-5.106.1
- salt-syndic-3000-5.106.1
-
SUSE Linux Enterprise Server ESPOS 15 (noarch)
- salt-zsh-completion-3000-5.106.1
- salt-bash-completion-3000-5.106.1
- salt-fish-completion-3000-5.106.1
-
SUSE Linux Enterprise High Performance Computing 15 LTSS 15 (aarch64 x86_64)
- salt-minion-3000-5.106.1
- salt-ssh-3000-5.106.1
- salt-standalone-formulas-configuration-3000-5.106.1
- python3-salt-3000-5.106.1
- salt-3000-5.106.1
- salt-cloud-3000-5.106.1
- python2-salt-3000-5.106.1
- salt-doc-3000-5.106.1
- salt-master-3000-5.106.1
- salt-api-3000-5.106.1
- salt-proxy-3000-5.106.1
- salt-syndic-3000-5.106.1
-
SUSE Linux Enterprise High Performance Computing 15 LTSS 15 (noarch)
- salt-zsh-completion-3000-5.106.1
- salt-bash-completion-3000-5.106.1
- salt-fish-completion-3000-5.106.1
-
SUSE Linux Enterprise Server 15 LTSS 15 (aarch64 ppc64le s390x x86_64)
- salt-minion-3000-5.106.1
- salt-ssh-3000-5.106.1
- salt-standalone-formulas-configuration-3000-5.106.1
- python3-salt-3000-5.106.1
- salt-3000-5.106.1
- salt-cloud-3000-5.106.1
- python2-salt-3000-5.106.1
- salt-doc-3000-5.106.1
- salt-master-3000-5.106.1
- salt-api-3000-5.106.1
- salt-proxy-3000-5.106.1
- salt-syndic-3000-5.106.1
-
SUSE Linux Enterprise Server 15 LTSS 15 (noarch)
- salt-zsh-completion-3000-5.106.1
- salt-bash-completion-3000-5.106.1
- salt-fish-completion-3000-5.106.1
-
SUSE Linux Enterprise Server for SAP Applications 15 (ppc64le x86_64)
- salt-minion-3000-5.106.1
- salt-ssh-3000-5.106.1
- salt-standalone-formulas-configuration-3000-5.106.1
- python3-salt-3000-5.106.1
- salt-3000-5.106.1
- salt-cloud-3000-5.106.1
- python2-salt-3000-5.106.1
- salt-doc-3000-5.106.1
- salt-master-3000-5.106.1
- salt-api-3000-5.106.1
- salt-proxy-3000-5.106.1
- salt-syndic-3000-5.106.1
-
SUSE Linux Enterprise Server for SAP Applications 15 (noarch)
- salt-zsh-completion-3000-5.106.1
- salt-bash-completion-3000-5.106.1
- salt-fish-completion-3000-5.106.1
References:
- https://www.suse.com/security/cve/CVE-2020-28243.html
- https://www.suse.com/security/cve/CVE-2020-28972.html
- https://www.suse.com/security/cve/CVE-2020-35662.html
- https://www.suse.com/security/cve/CVE-2021-25281.html
- https://www.suse.com/security/cve/CVE-2021-25282.html
- https://www.suse.com/security/cve/CVE-2021-25283.html
- https://www.suse.com/security/cve/CVE-2021-25284.html
- https://www.suse.com/security/cve/CVE-2021-3144.html
- https://www.suse.com/security/cve/CVE-2021-3148.html
- https://www.suse.com/security/cve/CVE-2021-3197.html
- https://bugzilla.suse.com/show_bug.cgi?id=1181550
- https://bugzilla.suse.com/show_bug.cgi?id=1181556
- https://bugzilla.suse.com/show_bug.cgi?id=1181557
- https://bugzilla.suse.com/show_bug.cgi?id=1181558
- https://bugzilla.suse.com/show_bug.cgi?id=1181559
- https://bugzilla.suse.com/show_bug.cgi?id=1181560
- https://bugzilla.suse.com/show_bug.cgi?id=1181561
- https://bugzilla.suse.com/show_bug.cgi?id=1181562
- https://bugzilla.suse.com/show_bug.cgi?id=1181563
- https://bugzilla.suse.com/show_bug.cgi?id=1181564
- https://bugzilla.suse.com/show_bug.cgi?id=1181565
- https://bugzilla.suse.com/show_bug.cgi?id=1182740