Security update for salt
Announcement ID: | SUSE-SU-2020:3243-1 |
---|---|
Rating: | critical |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves three vulnerabilities and has seven security fixes can now be installed.
Description:
This update for salt fixes the following issues:
- Avoid regression on "salt-master": set passphrase for salt-ssh keys to empty string (bsc#1178485)
- Properly validate eauth credentials and tokens on SSH calls made by Salt API (bsc#1178319, bsc#1178362, bsc#1178361, CVE-2020-25592, CVE-2020-17490, CVE-2020-16846)
- Fix disk.blkid to avoid unexpected keyword argument '__pub_user'. (bsc#1177867)
- Ensure virt.update stop_on_reboot is updated with its default value.
- Do not break package building for systemd OSes.
- Drop wrong mock from chroot unit test.
- Support systemd versions with dot. (bsc#1176294)
- Fix for grains.test_core unit test.
- Fix file/directory user and group ownership containing UTF-8 characters. (bsc#1176024)
- Several changes to virtualization:
- Fix virt update when cpu and memory are changed.
- Memory Tuning GSoC.
- Properly fix memory setting regression in virt.update.
- Expose libvirt on_reboot in virt states.
- Support transactional systems (MicroOS).
- zypperpkg module ignores retcode 104 for search(). (bsc#1159670)
- Xen disk fixes. No longer generates volumes for Xen disks, but the corresponding file or block disk. (bsc#1175987)
- Invalidate file list cache when cache file modified time is in the future. (bsc#1176397)
- Prevent import errors when running test_btrfs unit tests
Special Instructions and Notes:
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
Basesystem Module 15-SP1
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP1-2020-3243=1
-
Python 2 Module 15-SP1
zypper in -t patch SUSE-SLE-Module-Python2-15-SP1-2020-3243=1
-
Server Applications Module 15-SP1
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP1-2020-3243=1
Package List:
-
Basesystem Module 15-SP1 (aarch64 ppc64le s390x x86_64)
- python3-salt-3000-6.51.1
- salt-minion-3000-6.51.1
- salt-3000-6.51.1
- salt-doc-3000-6.51.1
-
Basesystem Module 15-SP1 (noarch)
- salt-zsh-completion-3000-6.51.1
- salt-bash-completion-3000-6.51.1
-
Python 2 Module 15-SP1 (aarch64 ppc64le s390x x86_64)
- python2-salt-3000-6.51.1
-
Server Applications Module 15-SP1 (aarch64 ppc64le s390x x86_64)
- salt-cloud-3000-6.51.1
- salt-master-3000-6.51.1
- salt-standalone-formulas-configuration-3000-6.51.1
- salt-proxy-3000-6.51.1
- salt-syndic-3000-6.51.1
- salt-ssh-3000-6.51.1
- salt-api-3000-6.51.1
-
Server Applications Module 15-SP1 (noarch)
- salt-fish-completion-3000-6.51.1
References:
- https://www.suse.com/security/cve/CVE-2020-16846.html
- https://www.suse.com/security/cve/CVE-2020-17490.html
- https://www.suse.com/security/cve/CVE-2020-25592.html
- https://bugzilla.suse.com/show_bug.cgi?id=1159670
- https://bugzilla.suse.com/show_bug.cgi?id=1175987
- https://bugzilla.suse.com/show_bug.cgi?id=1176024
- https://bugzilla.suse.com/show_bug.cgi?id=1176294
- https://bugzilla.suse.com/show_bug.cgi?id=1176397
- https://bugzilla.suse.com/show_bug.cgi?id=1177867
- https://bugzilla.suse.com/show_bug.cgi?id=1178319
- https://bugzilla.suse.com/show_bug.cgi?id=1178361
- https://bugzilla.suse.com/show_bug.cgi?id=1178362
- https://bugzilla.suse.com/show_bug.cgi?id=1178485