Security update for salt
Announcement ID: | SUSE-SU-2021:0627-1 |
---|---|
Rating: | critical |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves 10 vulnerabilities and has two security fixes can now be installed.
Description:
This update for salt fixes the following issues:
- Fix regression on cmd.run when passing tuples as cmd (bsc#1182740)
- Allow
extra_filerefs
as sanitizedkwargs
for SSH client - Fix errors with virt.update
- Fix for multiple for security issues (CVE-2020-28243) (CVE-2020-28972) (CVE-2020-35662) (CVE-2021-3148) (CVE-2021-3144) (CVE-2021-25281) (CVE-2021-25282) (CVE-2021-25283) (CVE-2021-25284) (CVE-2021-3197) (bsc#1181550) (bsc#1181556) (bsc#1181557) (bsc#1181558) (bsc#1181559) (bsc#1181560) (bsc#1181561) (bsc#1181562) (bsc#1181563) (bsc#1181564) (bsc#1181565)
- virt: search for
grub.xen
path - Xen spicevmc, DNS SRV records backports:
- Fix virtual network generated DNS XML for SRV records
- Don't add spicevmc channel to xen VMs
- virt UEFI fix: virt.update when
efi=True
Special Instructions and Notes:
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Manager Client Tools for SLE 12
zypper in -t patch SUSE-SLE-Manager-Tools-12-2021-627=1
-
Advanced Systems Management Module 12
zypper in -t patch SUSE-SLE-Module-Adv-Systems-Management-12-2021-627=1
-
SUSE Linux Enterprise Point of Service Image Server 12 12-SP2
zypper in -t patch SUSE-SLE-POS-12-SP2-2021-627=1
Package List:
-
SUSE Manager Client Tools for SLE 12 (aarch64 ppc64le s390x x86_64)
- salt-3000-46.129.1
- salt-minion-3000-46.129.1
- python2-salt-3000-46.129.1
- salt-doc-3000-46.129.1
- python3-salt-3000-46.129.1
-
Advanced Systems Management Module 12 (ppc64le s390x x86_64)
- salt-api-3000-46.129.1
- salt-3000-46.129.1
- salt-cloud-3000-46.129.1
- salt-minion-3000-46.129.1
- python2-salt-3000-46.129.1
- salt-standalone-formulas-configuration-3000-46.129.1
- salt-doc-3000-46.129.1
- salt-master-3000-46.129.1
- salt-syndic-3000-46.129.1
- salt-proxy-3000-46.129.1
- salt-ssh-3000-46.129.1
-
Advanced Systems Management Module 12 (noarch)
- salt-zsh-completion-3000-46.129.1
- salt-bash-completion-3000-46.129.1
-
SUSE Linux Enterprise Point of Service Image Server 12 12-SP2 (x86_64)
- python2-salt-3000-46.129.1
- salt-3000-46.129.1
- salt-minion-3000-46.129.1
References:
- https://www.suse.com/security/cve/CVE-2020-28243.html
- https://www.suse.com/security/cve/CVE-2020-28972.html
- https://www.suse.com/security/cve/CVE-2020-35662.html
- https://www.suse.com/security/cve/CVE-2021-25281.html
- https://www.suse.com/security/cve/CVE-2021-25282.html
- https://www.suse.com/security/cve/CVE-2021-25283.html
- https://www.suse.com/security/cve/CVE-2021-25284.html
- https://www.suse.com/security/cve/CVE-2021-3144.html
- https://www.suse.com/security/cve/CVE-2021-3148.html
- https://www.suse.com/security/cve/CVE-2021-3197.html
- https://bugzilla.suse.com/show_bug.cgi?id=1181550
- https://bugzilla.suse.com/show_bug.cgi?id=1181556
- https://bugzilla.suse.com/show_bug.cgi?id=1181557
- https://bugzilla.suse.com/show_bug.cgi?id=1181558
- https://bugzilla.suse.com/show_bug.cgi?id=1181559
- https://bugzilla.suse.com/show_bug.cgi?id=1181560
- https://bugzilla.suse.com/show_bug.cgi?id=1181561
- https://bugzilla.suse.com/show_bug.cgi?id=1181562
- https://bugzilla.suse.com/show_bug.cgi?id=1181563
- https://bugzilla.suse.com/show_bug.cgi?id=1181564
- https://bugzilla.suse.com/show_bug.cgi?id=1181565
- https://bugzilla.suse.com/show_bug.cgi?id=1182740