drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in salt
Name: |
Mehrere Probleme in salt |
|
ID: |
SUSE-SU-2020:3243-1 |
|
Distribution: |
SUSE |
|
Plattformen: |
SUSE Linux Enterprise Module for Server Applications 15-SP1, SUSE Linux Enterprise Module for Basesystem 15-SP1, SUSE Linux Enterprise Module for Python2 15-SP1 |
|
Datum: |
Sa, 7. November 2020, 08:42 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25592
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17490
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16846 |
|
Applikationen: |
Salt |
|
Originalnachricht |
SUSE Security Update: Security update for salt ______________________________________________________________________________
Announcement ID: SUSE-SU-2020:3243-1 Rating: critical References: #1159670 #1175987 #1176024 #1176294 #1176397 #1177867 #1178319 #1178361 #1178362 #1178485 Cross-References: CVE-2020-16846 CVE-2020-17490 CVE-2020-25592 Affected Products: SUSE Linux Enterprise Module for Server Applications 15-SP1 SUSE Linux Enterprise Module for Python2 15-SP1 SUSE Linux Enterprise Module for Basesystem 15-SP1 ______________________________________________________________________________
An update that solves three vulnerabilities and has 7 fixes is now available.
Description:
This update for salt fixes the following issues:
- Avoid regression on "salt-master": set passphrase for salt-ssh keys to empty string (bsc#1178485) - Properly validate eauth credentials and tokens on SSH calls made by Salt API (bsc#1178319, bsc#1178362, bsc#1178361, CVE-2020-25592, CVE-2020-17490, CVE-2020-16846) - Fix disk.blkid to avoid unexpected keyword argument '__pub_user'. (bsc#1177867) - Ensure virt.update stop_on_reboot is updated with its default value. - Do not break package building for systemd OSes. - Drop wrong mock from chroot unit test. - Support systemd versions with dot. (bsc#1176294) - Fix for grains.test_core unit test. - Fix file/directory user and group ownership containing UTF-8 characters. (bsc#1176024) - Several changes to virtualization: * Fix virt update when cpu and memory are changed. * Memory Tuning GSoC. * Properly fix memory setting regression in virt.update. * Expose libvirt on_reboot in virt states. - Support transactional systems (MicroOS). - zypperpkg module ignores retcode 104 for search(). (bsc#1159670) - Xen disk fixes. No longer generates volumes for Xen disks, but the corresponding file or block disk. (bsc#1175987) - Invalidate file list cache when cache file modified time is in the future. (bsc#1176397) - Prevent import errors when running test_btrfs unit tests
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Module for Server Applications 15-SP1:
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP1-2020-3243=1
- SUSE Linux Enterprise Module for Python2 15-SP1:
zypper in -t patch SUSE-SLE-Module-Python2-15-SP1-2020-3243=1
- SUSE Linux Enterprise Module for Basesystem 15-SP1:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP1-2020-3243=1
Package List:
- SUSE Linux Enterprise Module for Server Applications 15-SP1 (aarch64 ppc64le s390x x86_64):
salt-api-3000-6.51.1 salt-cloud-3000-6.51.1 salt-master-3000-6.51.1 salt-proxy-3000-6.51.1 salt-ssh-3000-6.51.1 salt-standalone-formulas-configuration-3000-6.51.1 salt-syndic-3000-6.51.1
- SUSE Linux Enterprise Module for Server Applications 15-SP1 (noarch):
salt-fish-completion-3000-6.51.1
- SUSE Linux Enterprise Module for Python2 15-SP1 (aarch64 ppc64le s390x x86_64):
python2-salt-3000-6.51.1
- SUSE Linux Enterprise Module for Basesystem 15-SP1 (aarch64 ppc64le s390x x86_64):
python3-salt-3000-6.51.1 salt-3000-6.51.1 salt-doc-3000-6.51.1 salt-minion-3000-6.51.1
- SUSE Linux Enterprise Module for Basesystem 15-SP1 (noarch):
salt-bash-completion-3000-6.51.1 salt-zsh-completion-3000-6.51.1
References:
https://www.suse.com/security/cve/CVE-2020-16846.html https://www.suse.com/security/cve/CVE-2020-17490.html https://www.suse.com/security/cve/CVE-2020-25592.html https://bugzilla.suse.com/1159670 https://bugzilla.suse.com/1175987 https://bugzilla.suse.com/1176024 https://bugzilla.suse.com/1176294 https://bugzilla.suse.com/1176397 https://bugzilla.suse.com/1177867 https://bugzilla.suse.com/1178319 https://bugzilla.suse.com/1178361 https://bugzilla.suse.com/1178362 https://bugzilla.suse.com/1178485
|
|
|
|