Security update for Salt
Announcement ID: | SUSE-SU-2017:2674-1 |
---|---|
Rating: | moderate |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves one vulnerability and has four security fixes can now be installed.
Description:
This update for salt fixes one security issue and bugs:
The following security issue has been fixed:
- CVE-2017-12791: Directory traversal vulnerability in minion id validation allowed remote minions with incorrect credentials to authenticate to a master via a crafted minion ID (bsc#1053955).
Additionally, the following non-security issues have been fixed:
- Added support for SUSE Manager scalability features. (bsc#1052264)
- Introduced the kubernetes module. (bsc#1051948)
- Notify systemd synchronously via NOTIFY_SOCKET. (bsc#1053376)
- Added bugfix when jobs scheduled to run at a future time stay pending for Salt minions. (bsc#1036125)
- Adding procps as dependency. This provides "ps" and "pgrep" utils which are called from different Salt modules and also from new salt-minion watchdog.
Special Instructions and Notes:
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Manager Proxy 3.1
zypper in -t patch SUSE-SUSE-Manager-Proxy-3.1-2017-1654=1
-
SUSE Manager Server 3.1
zypper in -t patch SUSE-SUSE-Manager-Server-3.1-2017-1654=1
Package List:
-
SUSE Manager Proxy 3.1 (ppc64le x86_64)
- salt-minion-2016.11.4-4.3.1
- salt-2016.11.4-4.3.1
-
SUSE Manager Server 3.1 (ppc64le s390x x86_64)
- salt-minion-2016.11.4-4.3.1
- salt-api-2016.11.4-4.3.1
- salt-syndic-2016.11.4-4.3.1
- salt-doc-2016.11.4-4.3.1
- salt-cloud-2016.11.4-4.3.1
- salt-2016.11.4-4.3.1
- salt-proxy-2016.11.4-4.3.1
- salt-ssh-2016.11.4-4.3.1
- salt-master-2016.11.4-4.3.1
-
SUSE Manager Server 3.1 (noarch)
- salt-zsh-completion-2016.11.4-4.3.1
- salt-bash-completion-2016.11.4-4.3.1
References:
- https://www.suse.com/security/cve/CVE-2017-12791.html
- https://bugzilla.suse.com/show_bug.cgi?id=1036125
- https://bugzilla.suse.com/show_bug.cgi?id=1051948
- https://bugzilla.suse.com/show_bug.cgi?id=1052264
- https://bugzilla.suse.com/show_bug.cgi?id=1053376
- https://bugzilla.suse.com/show_bug.cgi?id=1053955