drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in salt
Name: |
Mehrere Probleme in salt |
|
ID: |
SUSE-SU-2021:2105-1 |
|
Distribution: |
SUSE |
|
Plattformen: |
SUSE Enterprise Storage 6, SUSE CaaS Platform 4.0, SUSE Linux Enterprise Server for SAP 15-SP1, SUSE Manager Server 4.0, SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS, SUSE Linux Enterprise Server 15-SP1-LTSS, SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS, SUSE Manager Proxy 4.0, SUSE Manager Retail Branch Server 4.0, SUSE Linux Enterprise Server 15-SP1-BCL |
|
Datum: |
Di, 22. Juni 2021, 07:48 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11651
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25592
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11652
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31607
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25315 |
|
Applikationen: |
Salt |
|
Originalnachricht |
SUSE Security Update: Security update for salt ______________________________________________________________________________
Announcement ID: SUSE-SU-2021:2105-1 Rating: critical References: #1171257 #1176293 #1179831 #1181368 #1182281 #1182293 #1182382 #1185092 #1185281 #1186674 ECO-3212 SLE-18028 SLE-18033 Cross-References: CVE-2018-15750 CVE-2018-15751 CVE-2020-11651 CVE-2020-11652 CVE-2020-25592 CVE-2021-25315 CVE-2021-31607 CVSS scores: CVE-2018-15750 (NVD) : 5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N CVE-2018-15750 (SUSE): 8.7 CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N CVE-2018-15751 (NVD) : 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVE-2018-15751 (SUSE): 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVE-2020-11651 (NVD) : 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVE-2020-11651 (SUSE): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVE-2020-11652 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N CVE-2020-11652 (SUSE): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H CVE-2020-25592 (NVD) : 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVE-2020-25592 (SUSE): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVE-2021-25315 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVE-2021-25315 (SUSE): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVE-2021-31607 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVE-2021-31607 (SUSE): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products: SUSE Manager Server 4.0 SUSE Manager Retail Branch Server 4.0 SUSE Manager Proxy 4.0 SUSE Linux Enterprise Server for SAP 15-SP1 SUSE Linux Enterprise Server 15-SP1-LTSS SUSE Linux Enterprise Server 15-SP1-BCL SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS SUSE Enterprise Storage 6 SUSE CaaS Platform 4.0 ______________________________________________________________________________
An update that solves 7 vulnerabilities, contains three features and has three fixes is now available.
Description:
This update for salt fixes the following issues:
Update to Salt release version 3002.2 (jsc#ECO-3212, jsc#SLE-18033, jsc#SLE-18028)
- Check if dpkgnotify is executable (bsc#1186674) - Drop support for Python2. Obsoletes `python2-salt` package (jsc#SLE-18028) - virt module updates * network: handle missing ipv4 netmask attribute * more network support * PCI/USB host devices passthrough support - Set distro requirement to oldest supported version in requirements/base.txt - Bring missing part of async batch implementation back (bsc#1182382, CVE-2021-25315) - Always require python3-distro (bsc#1182293) - Remove deprecated warning that breaks minion execution when "server_id_use_crc" opts is missing - Fix pkg states when DEB package has "all" arch - Do not force beacons configuration to be a list. - Remove msgpack < 1.0.0 from base requirements (bsc#1176293) - msgpack support for version >= 1.0.0 (bsc#1171257) - Fix issue parsing errors in ansiblegate state module - Prevent command injection in the snapper module (bsc#1185281, CVE-2021-31607) - transactional_update: detect recursion in the executor - Add subpackage salt-transactional-update (jsc#SLE-18033) - Remove duplicate directories from specfile - Improvements on "ansiblegate" module (bsc#1185092): * New methods: ansible.targets / ansible.discover_playbooks - Add support for Alibaba Cloud Linux 2 (Aliyun Linux) - Regression fix of salt-ssh on processing targets - Update target fix for salt-ssh and avoiding race condition on salt-ssh event processing (bsc#1179831, bsc#1182281) - Add notify beacon for Debian/Ubuntu systems - Fix zmq bug that causes salt-call to freeze (bsc#1181368)
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- SUSE Manager Server 4.0:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-2105=1
- SUSE Manager Retail Branch Server 4.0:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-2105=1
- SUSE Manager Proxy 4.0:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-2105=1
- SUSE Linux Enterprise Server for SAP 15-SP1:
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2021-2105=1
- SUSE Linux Enterprise Server 15-SP1-LTSS:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-2105=1
- SUSE Linux Enterprise Server 15-SP1-BCL:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-BCL-2021-2105=1
- SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-2105=1
- SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-2105=1
- SUSE Enterprise Storage 6:
zypper in -t patch SUSE-Storage-6-2021-2105=1
- SUSE CaaS Platform 4.0:
To install this update, use the SUSE CaaS Platform 'skuba' tool. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way.
Package List:
- SUSE Manager Server 4.0 (ppc64le s390x x86_64):
python3-salt-3002.2-37.1 salt-3002.2-37.1 salt-api-3002.2-37.1 salt-cloud-3002.2-37.1 salt-doc-3002.2-37.1 salt-master-3002.2-37.1 salt-minion-3002.2-37.1 salt-proxy-3002.2-37.1 salt-ssh-3002.2-37.1 salt-standalone-formulas-configuration-3002.2-37.1 salt-syndic-3002.2-37.1 salt-transactional-update-3002.2-37.1
- SUSE Manager Server 4.0 (noarch):
salt-bash-completion-3002.2-37.1 salt-fish-completion-3002.2-37.1 salt-zsh-completion-3002.2-37.1
- SUSE Manager Retail Branch Server 4.0 (x86_64):
python3-salt-3002.2-37.1 salt-3002.2-37.1 salt-api-3002.2-37.1 salt-cloud-3002.2-37.1 salt-doc-3002.2-37.1 salt-master-3002.2-37.1 salt-minion-3002.2-37.1 salt-proxy-3002.2-37.1 salt-ssh-3002.2-37.1 salt-standalone-formulas-configuration-3002.2-37.1 salt-syndic-3002.2-37.1 salt-transactional-update-3002.2-37.1
- SUSE Manager Retail Branch Server 4.0 (noarch):
salt-bash-completion-3002.2-37.1 salt-fish-completion-3002.2-37.1 salt-zsh-completion-3002.2-37.1
- SUSE Manager Proxy 4.0 (noarch):
salt-bash-completion-3002.2-37.1 salt-fish-completion-3002.2-37.1 salt-zsh-completion-3002.2-37.1
- SUSE Manager Proxy 4.0 (x86_64):
python3-salt-3002.2-37.1 salt-3002.2-37.1 salt-api-3002.2-37.1 salt-cloud-3002.2-37.1 salt-doc-3002.2-37.1 salt-master-3002.2-37.1 salt-minion-3002.2-37.1 salt-proxy-3002.2-37.1 salt-ssh-3002.2-37.1 salt-standalone-formulas-configuration-3002.2-37.1 salt-syndic-3002.2-37.1 salt-transactional-update-3002.2-37.1
- SUSE Linux Enterprise Server for SAP 15-SP1 (ppc64le x86_64):
python3-salt-3002.2-37.1 salt-3002.2-37.1 salt-api-3002.2-37.1 salt-cloud-3002.2-37.1 salt-doc-3002.2-37.1 salt-master-3002.2-37.1 salt-minion-3002.2-37.1 salt-proxy-3002.2-37.1 salt-ssh-3002.2-37.1 salt-standalone-formulas-configuration-3002.2-37.1 salt-syndic-3002.2-37.1 salt-transactional-update-3002.2-37.1
- SUSE Linux Enterprise Server for SAP 15-SP1 (noarch):
salt-bash-completion-3002.2-37.1 salt-fish-completion-3002.2-37.1 salt-zsh-completion-3002.2-37.1
- SUSE Linux Enterprise Server 15-SP1-LTSS (aarch64 ppc64le s390x x86_64):
python3-salt-3002.2-37.1 salt-3002.2-37.1 salt-api-3002.2-37.1 salt-cloud-3002.2-37.1 salt-doc-3002.2-37.1 salt-master-3002.2-37.1 salt-minion-3002.2-37.1 salt-proxy-3002.2-37.1 salt-ssh-3002.2-37.1 salt-standalone-formulas-configuration-3002.2-37.1 salt-syndic-3002.2-37.1 salt-transactional-update-3002.2-37.1
- SUSE Linux Enterprise Server 15-SP1-LTSS (noarch):
salt-bash-completion-3002.2-37.1 salt-fish-completion-3002.2-37.1 salt-zsh-completion-3002.2-37.1
- SUSE Linux Enterprise Server 15-SP1-BCL (noarch):
salt-bash-completion-3002.2-37.1 salt-fish-completion-3002.2-37.1 salt-zsh-completion-3002.2-37.1
- SUSE Linux Enterprise Server 15-SP1-BCL (x86_64):
python3-salt-3002.2-37.1 salt-3002.2-37.1 salt-api-3002.2-37.1 salt-cloud-3002.2-37.1 salt-doc-3002.2-37.1 salt-master-3002.2-37.1 salt-minion-3002.2-37.1 salt-proxy-3002.2-37.1 salt-ssh-3002.2-37.1 salt-standalone-formulas-configuration-3002.2-37.1 salt-syndic-3002.2-37.1 salt-transactional-update-3002.2-37.1
- SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (aarch64 x86_64):
python3-salt-3002.2-37.1 salt-3002.2-37.1 salt-api-3002.2-37.1 salt-cloud-3002.2-37.1 salt-doc-3002.2-37.1 salt-master-3002.2-37.1 salt-minion-3002.2-37.1 salt-proxy-3002.2-37.1 salt-ssh-3002.2-37.1 salt-standalone-formulas-configuration-3002.2-37.1 salt-syndic-3002.2-37.1 salt-transactional-update-3002.2-37.1
- SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (noarch):
salt-bash-completion-3002.2-37.1 salt-fish-completion-3002.2-37.1 salt-zsh-completion-3002.2-37.1
- SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (aarch64 x86_64):
python3-salt-3002.2-37.1 salt-3002.2-37.1 salt-api-3002.2-37.1 salt-cloud-3002.2-37.1 salt-doc-3002.2-37.1 salt-master-3002.2-37.1 salt-minion-3002.2-37.1 salt-proxy-3002.2-37.1 salt-ssh-3002.2-37.1 salt-standalone-formulas-configuration-3002.2-37.1 salt-syndic-3002.2-37.1 salt-transactional-update-3002.2-37.1
- SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (noarch):
salt-bash-completion-3002.2-37.1 salt-fish-completion-3002.2-37.1 salt-zsh-completion-3002.2-37.1
- SUSE Enterprise Storage 6 (aarch64 x86_64):
python3-salt-3002.2-37.1 salt-3002.2-37.1 salt-api-3002.2-37.1 salt-cloud-3002.2-37.1 salt-doc-3002.2-37.1 salt-master-3002.2-37.1 salt-minion-3002.2-37.1 salt-proxy-3002.2-37.1 salt-ssh-3002.2-37.1 salt-standalone-formulas-configuration-3002.2-37.1 salt-syndic-3002.2-37.1 salt-transactional-update-3002.2-37.1
- SUSE Enterprise Storage 6 (noarch):
salt-bash-completion-3002.2-37.1 salt-fish-completion-3002.2-37.1 salt-zsh-completion-3002.2-37.1
- SUSE CaaS Platform 4.0 (noarch):
salt-bash-completion-3002.2-37.1 salt-fish-completion-3002.2-37.1 salt-zsh-completion-3002.2-37.1
- SUSE CaaS Platform 4.0 (x86_64):
python3-salt-3002.2-37.1 salt-3002.2-37.1 salt-api-3002.2-37.1 salt-cloud-3002.2-37.1 salt-doc-3002.2-37.1 salt-master-3002.2-37.1 salt-minion-3002.2-37.1 salt-proxy-3002.2-37.1 salt-ssh-3002.2-37.1 salt-standalone-formulas-configuration-3002.2-37.1 salt-syndic-3002.2-37.1 salt-transactional-update-3002.2-37.1
References:
https://www.suse.com/security/cve/CVE-2018-15750.html https://www.suse.com/security/cve/CVE-2018-15751.html https://www.suse.com/security/cve/CVE-2020-11651.html https://www.suse.com/security/cve/CVE-2020-11652.html https://www.suse.com/security/cve/CVE-2020-25592.html https://www.suse.com/security/cve/CVE-2021-25315.html https://www.suse.com/security/cve/CVE-2021-31607.html https://bugzilla.suse.com/1171257 https://bugzilla.suse.com/1176293 https://bugzilla.suse.com/1179831 https://bugzilla.suse.com/1181368 https://bugzilla.suse.com/1182281 https://bugzilla.suse.com/1182293 https://bugzilla.suse.com/1182382 https://bugzilla.suse.com/1185092 https://bugzilla.suse.com/1185281 https://bugzilla.suse.com/1186674
|
|
|
|