Security Beta update for SUSE Manager Client Tools
Announcement ID: | SUSE-SU-2021:14677-1 |
---|---|
Rating: | moderate |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves 10 vulnerabilities and has 10 security fixes can now be installed.
Description:
This update fixes the following issues:
salt:
- Only require python-certifi for CentOS7
- Fix race conditions for corner cases when handling SIGTERM by minion (bsc#1172110)
- Implementation of suse_ip execution module to prevent issues with network.managed (bsc#1099976)
- Fix recursion false detection in payload (bsc#1180101)
- Add sleep on exception handling on minion connection attempt to the master (bsc#1174855)
- Allows for the VMware provider to handle CPU and memory hot-add in newer versions of the software. (bsc#1181347)
- Always require python-certifi (used by salt.ext.tornado)
- Exclude SLE 12 from requiring python-certifi
- Do not crash when unexpected cmd output at listing patches (bsc#1181290)
- Fix behavior for "onlyif/unless" when multiple conditions (bsc#1180818)
- Fix regression on cmd.run when passing tuples as cmd (bsc#1182740)
- Allow extra_filerefs as sanitized kwargs for SSH client
- Fix errors with virt.update
- Fix for multiple for security issues (CVE-2020-28243) (CVE-2020-28972) (CVE-2020-35662) (CVE-2021-3148) (CVE-2021-3144) (CVE-2021-25281) (CVE-2021-25282) (CVE-2021-25283) (CVE-2021-25284) (CVE-2021-3197) (bsc#1181550) (bsc#1181556) (bsc#1181557) (bsc#1181558) (bsc#1181559) (bsc#1181560) (bsc#1181561) (bsc#1181562) (bsc#1181563) (bsc#1181564) (bsc#1181565)
- Virt: search for grub.xen path
- Xen spicevmc, DNS SRV records backports: Fix virtual network generated DNS XML for SRV records Don't add spicevmc channel to xen VMs
- Virt UEFI fix: virt.update when efi=True
- Master can read grains (bsc#1179696)
Special Instructions and Notes:
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Manager Client Tools Beta for Ubuntu 16.04 1604
zypper in -t patch suse-ubu164ct-client-tools-beta-202103-14677=1
Package List:
-
SUSE Manager Client Tools Beta for Ubuntu 16.04 1604 (all)
- salt-minion-3000+ds-1+9.26.1
- salt-common-3000+ds-1+9.26.1
References:
- https://www.suse.com/security/cve/CVE-2020-28243.html
- https://www.suse.com/security/cve/CVE-2020-28972.html
- https://www.suse.com/security/cve/CVE-2020-35662.html
- https://www.suse.com/security/cve/CVE-2021-25281.html
- https://www.suse.com/security/cve/CVE-2021-25282.html
- https://www.suse.com/security/cve/CVE-2021-25283.html
- https://www.suse.com/security/cve/CVE-2021-25284.html
- https://www.suse.com/security/cve/CVE-2021-3144.html
- https://www.suse.com/security/cve/CVE-2021-3148.html
- https://www.suse.com/security/cve/CVE-2021-3197.html
- https://bugzilla.suse.com/show_bug.cgi?id=1099976
- https://bugzilla.suse.com/show_bug.cgi?id=1172110
- https://bugzilla.suse.com/show_bug.cgi?id=1174855
- https://bugzilla.suse.com/show_bug.cgi?id=1179696
- https://bugzilla.suse.com/show_bug.cgi?id=1180101
- https://bugzilla.suse.com/show_bug.cgi?id=1180818
- https://bugzilla.suse.com/show_bug.cgi?id=1181290
- https://bugzilla.suse.com/show_bug.cgi?id=1181347
- https://bugzilla.suse.com/show_bug.cgi?id=1181550
- https://bugzilla.suse.com/show_bug.cgi?id=1181556
- https://bugzilla.suse.com/show_bug.cgi?id=1181557
- https://bugzilla.suse.com/show_bug.cgi?id=1181558
- https://bugzilla.suse.com/show_bug.cgi?id=1181559
- https://bugzilla.suse.com/show_bug.cgi?id=1181560
- https://bugzilla.suse.com/show_bug.cgi?id=1181561
- https://bugzilla.suse.com/show_bug.cgi?id=1181562
- https://bugzilla.suse.com/show_bug.cgi?id=1181563
- https://bugzilla.suse.com/show_bug.cgi?id=1181564
- https://bugzilla.suse.com/show_bug.cgi?id=1181565
- https://bugzilla.suse.com/show_bug.cgi?id=1182740