Recommended update for salt
Announcement ID: | SUSE-RU-2022:1391-1 |
---|---|
Rating: | important |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves four vulnerabilities and has three fixes can now be installed.
Description:
This update for salt fixes the following issues:
- Fix regression preventing bootstrapping new clients caused by redundant dependency on psutil (bsc#1197533)
- Prevent data pollution between actions processed at the same time (bsc#1197637)
- Fix salt-ssh opts poisoning. (bsc#1197637)
- Clear network interfaces cache on grains request. (bsc#1196050)
- Fix Salt-API failure due to an exception from the scheduled SSH-Push Tasks. (bsc#1182851, bsc#1196432)
- Restrict "state.orchestrate_single" to pass a pillar value if it exists. (bsc#1194632)
Special Instructions and Notes:
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
openSUSE Leap 15.3
zypper in -t patch SUSE-2022-1391=1
-
Basesystem Module 15-SP3
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP3-2022-1391=1
-
Server Applications Module 15-SP3
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP3-2022-1391=1
-
Transactional Server Module 15-SP3
zypper in -t patch SUSE-SLE-Module-Transactional-Server-15-SP3-2022-1391=1
-
SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2022-1391=1
-
SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2022-1391=1
-
SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2022-1391=1
Package List:
-
openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
- salt-standalone-formulas-configuration-3002.2-150300.53.16.1
- salt-master-3002.2-150300.53.16.1
- python3-salt-3002.2-150300.53.16.1
- salt-ssh-3002.2-150300.53.16.1
- salt-api-3002.2-150300.53.16.1
- salt-transactional-update-3002.2-150300.53.16.1
- salt-3002.2-150300.53.16.1
- salt-cloud-3002.2-150300.53.16.1
- salt-proxy-3002.2-150300.53.16.1
- salt-minion-3002.2-150300.53.16.1
- salt-syndic-3002.2-150300.53.16.1
- salt-doc-3002.2-150300.53.16.1
-
openSUSE Leap 15.3 (noarch)
- salt-bash-completion-3002.2-150300.53.16.1
- salt-fish-completion-3002.2-150300.53.16.1
- salt-zsh-completion-3002.2-150300.53.16.1
-
Basesystem Module 15-SP3 (aarch64 ppc64le s390x x86_64)
- salt-3002.2-150300.53.16.1
- python3-salt-3002.2-150300.53.16.1
- salt-doc-3002.2-150300.53.16.1
- salt-minion-3002.2-150300.53.16.1
-
Basesystem Module 15-SP3 (noarch)
- salt-bash-completion-3002.2-150300.53.16.1
- salt-zsh-completion-3002.2-150300.53.16.1
-
Server Applications Module 15-SP3 (aarch64 ppc64le s390x x86_64)
- salt-standalone-formulas-configuration-3002.2-150300.53.16.1
- salt-master-3002.2-150300.53.16.1
- salt-ssh-3002.2-150300.53.16.1
- salt-api-3002.2-150300.53.16.1
- salt-cloud-3002.2-150300.53.16.1
- salt-proxy-3002.2-150300.53.16.1
- salt-syndic-3002.2-150300.53.16.1
-
Server Applications Module 15-SP3 (noarch)
- salt-fish-completion-3002.2-150300.53.16.1
-
Transactional Server Module 15-SP3 (aarch64 ppc64le s390x x86_64)
- salt-transactional-update-3002.2-150300.53.16.1
-
SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64)
- salt-3002.2-150300.53.16.1
- python3-salt-3002.2-150300.53.16.1
- salt-minion-3002.2-150300.53.16.1
- salt-transactional-update-3002.2-150300.53.16.1
-
SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
- salt-3002.2-150300.53.16.1
- python3-salt-3002.2-150300.53.16.1
- salt-minion-3002.2-150300.53.16.1
- salt-transactional-update-3002.2-150300.53.16.1
-
SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
- salt-3002.2-150300.53.16.1
- python3-salt-3002.2-150300.53.16.1
- salt-minion-3002.2-150300.53.16.1
- salt-transactional-update-3002.2-150300.53.16.1
References:
- https://www.suse.com/security/cve/CVE-2022-22934.html
- https://www.suse.com/security/cve/CVE-2022-22935.html
- https://www.suse.com/security/cve/CVE-2022-22936.html
- https://www.suse.com/security/cve/CVE-2022-22941.html
- https://bugzilla.suse.com/show_bug.cgi?id=1182851
- https://bugzilla.suse.com/show_bug.cgi?id=1194632
- https://bugzilla.suse.com/show_bug.cgi?id=1196050
- https://bugzilla.suse.com/show_bug.cgi?id=1196432
- https://bugzilla.suse.com/show_bug.cgi?id=1197417
- https://bugzilla.suse.com/show_bug.cgi?id=1197533
- https://bugzilla.suse.com/show_bug.cgi?id=1197637