Security update for Salt
Announcement ID: | SUSE-SU-2020:3245-1 |
---|---|
Rating: | critical |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves three vulnerabilities and has seven security fixes can now be installed.
Description:
This update fixes the following issues:
salt:
- Fix disk.blkid to avoid unexpected keyword argument '__pub_user' (bsc#1177867)
- Ensure virt.update stop_on_reboot is updated with its default value
- Do not break package building for systemd OSes
- Drop wrong mock from chroot unit test
- Support systemd versions with dot (bsc#1176294)
- Fix for grains.test_core unit test
- Fix file/directory user and group ownership containing UTF-8 characters (bsc#1176024)
- Several changes to virtualization:
- Fix virt update when cpu and memory are changed
- Memory Tuning GSoC
- Properly fix memory setting regression in virt.update
- Expose libvirt on_reboot in virt states
- Support transactional systems (MicroOS)
- Zypperpkg module ignores retcode 104 for search() (bsc#1159670)
- Xen disk fixes. No longer generates volumes for Xen disks, but the corresponding file or block disk (bsc#1175987)
- Invalidate file list cache when cache file modified time is in the future (bsc#1176397)
- Prevent import errors when running test_btrfs unit tests
- Properly validate eauth credentials and tokens on SSH calls made by Salt API (bsc#1178319, bsc#1178362, bsc#1178361, CVE-2020-25592, CVE-2020-17490, CVE-2020-16846)
- Avoid regression on "salt-master": set passphrase for salt-ssh keys to empty string (bsc#1178485)
Special Instructions and Notes:
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Manager Client Tools for SLE 12
zypper in -t patch SUSE-SLE-Manager-Tools-12-2020-3245=1
-
Advanced Systems Management Module 12
zypper in -t patch SUSE-SLE-Module-Adv-Systems-Management-12-2020-3245=1
-
SUSE Linux Enterprise Point of Service Image Server 12 12-SP2
zypper in -t patch SUSE-SLE-POS-12-SP2-2020-3245=1
-
SUSE Manager Proxy 3.2
zypper in -t patch SUSE-SUSE-Manager-Proxy-3.2-2020-3245=1
-
SUSE Manager Server 3.2
zypper in -t patch SUSE-SUSE-Manager-Server-3.2-2020-3245=1
Package List:
-
SUSE Manager Client Tools for SLE 12 (aarch64 ppc64le s390x x86_64)
- python2-salt-3000-46.114.1
- salt-minion-3000-46.114.1
- salt-doc-3000-46.114.1
- python3-salt-3000-46.114.1
- salt-3000-46.114.1
-
Advanced Systems Management Module 12 (ppc64le s390x x86_64)
- salt-cloud-3000-46.114.1
- salt-master-3000-46.114.1
- python2-salt-3000-46.114.1
- salt-doc-3000-46.114.1
- salt-minion-3000-46.114.1
- salt-api-3000-46.114.1
- salt-standalone-formulas-configuration-3000-46.114.1
- salt-ssh-3000-46.114.1
- salt-syndic-3000-46.114.1
- salt-3000-46.114.1
- salt-proxy-3000-46.114.1
-
Advanced Systems Management Module 12 (noarch)
- salt-zsh-completion-3000-46.114.1
- salt-bash-completion-3000-46.114.1
-
SUSE Linux Enterprise Point of Service Image Server 12 12-SP2 (x86_64)
- salt-3000-46.114.1
- python2-salt-3000-46.114.1
- salt-minion-3000-46.114.1
-
SUSE Manager Proxy 3.2 (x86_64)
- salt-3000-46.114.1
- python2-salt-3000-46.114.1
- salt-minion-3000-46.114.1
- python3-salt-3000-46.114.1
-
SUSE Manager Server 3.2 (ppc64le s390x x86_64)
- salt-cloud-3000-46.114.1
- salt-syndic-3000-46.114.1
- salt-master-3000-46.114.1
- python2-salt-3000-46.114.1
- salt-doc-3000-46.114.1
- salt-minion-3000-46.114.1
- salt-api-3000-46.114.1
- salt-standalone-formulas-configuration-3000-46.114.1
- python3-salt-3000-46.114.1
- salt-ssh-3000-46.114.1
- salt-3000-46.114.1
- salt-proxy-3000-46.114.1
-
SUSE Manager Server 3.2 (noarch)
- salt-zsh-completion-3000-46.114.1
- salt-bash-completion-3000-46.114.1
References:
- https://www.suse.com/security/cve/CVE-2020-16846.html
- https://www.suse.com/security/cve/CVE-2020-17490.html
- https://www.suse.com/security/cve/CVE-2020-25592.html
- https://bugzilla.suse.com/show_bug.cgi?id=1159670
- https://bugzilla.suse.com/show_bug.cgi?id=1175987
- https://bugzilla.suse.com/show_bug.cgi?id=1176024
- https://bugzilla.suse.com/show_bug.cgi?id=1176294
- https://bugzilla.suse.com/show_bug.cgi?id=1176397
- https://bugzilla.suse.com/show_bug.cgi?id=1177867
- https://bugzilla.suse.com/show_bug.cgi?id=1178319
- https://bugzilla.suse.com/show_bug.cgi?id=1178361
- https://bugzilla.suse.com/show_bug.cgi?id=1178362
- https://bugzilla.suse.com/show_bug.cgi?id=1178485