Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in salt
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in salt
ID: SUSE-SU-2021:2105-1
Distribution: SUSE
Plattformen: SUSE Enterprise Storage 6, SUSE CaaS Platform 4.0, SUSE Linux Enterprise Server for SAP 15-SP1, SUSE Manager Server 4.0, SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS, SUSE Linux Enterprise Server 15-SP1-LTSS, SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS, SUSE Manager Proxy 4.0, SUSE Manager Retail Branch Server 4.0, SUSE Linux Enterprise Server 15-SP1-BCL
Datum: Di, 22. Juni 2021, 07:48
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11651
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25592
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11652
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31607
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25315
Applikationen: Salt

Originalnachricht


SUSE Security Update: Security update for salt
______________________________________________________________________________

Announcement ID: SUSE-SU-2021:2105-1
Rating: critical
References: #1171257 #1176293 #1179831 #1181368 #1182281
#1182293 #1182382 #1185092 #1185281 #1186674
ECO-3212 SLE-18028 SLE-18033
Cross-References: CVE-2018-15750 CVE-2018-15751 CVE-2020-11651
CVE-2020-11652 CVE-2020-25592 CVE-2021-25315
CVE-2021-31607
CVSS scores:
CVE-2018-15750 (NVD) : 5.3
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CVE-2018-15750 (SUSE): 8.7
CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N
CVE-2018-15751 (NVD) : 9.8
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2018-15751 (SUSE): 9.8
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2020-11651 (NVD) : 9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2020-11651 (SUSE): 9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2020-11652 (NVD) : 6.5
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CVE-2020-11652 (SUSE): 7.2
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CVE-2020-25592 (NVD) : 9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2020-25592 (SUSE): 9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2021-25315 (NVD) : 7.8
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2021-25315 (SUSE): 9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2021-31607 (NVD) : 7.8
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2021-31607 (SUSE): 7
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

Affected Products:
SUSE Manager Server 4.0
SUSE Manager Retail Branch Server 4.0
SUSE Manager Proxy 4.0
SUSE Linux Enterprise Server for SAP 15-SP1
SUSE Linux Enterprise Server 15-SP1-LTSS
SUSE Linux Enterprise Server 15-SP1-BCL
SUSE Linux Enterprise High Performance Computing
15-SP1-LTSS
SUSE Linux Enterprise High Performance Computing
15-SP1-ESPOS
SUSE Enterprise Storage 6
SUSE CaaS Platform 4.0
______________________________________________________________________________

An update that solves 7 vulnerabilities, contains three
features and has three fixes is now available.

Description:

This update for salt fixes the following issues:

Update to Salt release version 3002.2 (jsc#ECO-3212, jsc#SLE-18033,
jsc#SLE-18028)

- Check if dpkgnotify is executable (bsc#1186674)
- Drop support for Python2. Obsoletes `python2-salt` package
(jsc#SLE-18028)
- virt module updates
* network: handle missing ipv4 netmask attribute
* more network support
* PCI/USB host devices passthrough support
- Set distro requirement to oldest supported version in
requirements/base.txt
- Bring missing part of async batch implementation back (bsc#1182382,
CVE-2021-25315)
- Always require python3-distro (bsc#1182293)
- Remove deprecated warning that breaks minion execution when
"server_id_use_crc" opts is missing
- Fix pkg states when DEB package has "all" arch
- Do not force beacons configuration to be a list.
- Remove msgpack < 1.0.0 from base requirements (bsc#1176293)
- msgpack support for version >= 1.0.0 (bsc#1171257)
- Fix issue parsing errors in ansiblegate state module
- Prevent command injection in the snapper module (bsc#1185281,
CVE-2021-31607)
- transactional_update: detect recursion in the executor
- Add subpackage salt-transactional-update (jsc#SLE-18033)
- Remove duplicate directories from specfile
- Improvements on "ansiblegate" module (bsc#1185092):
* New methods: ansible.targets / ansible.discover_playbooks
- Add support for Alibaba Cloud Linux 2 (Aliyun Linux)
- Regression fix of salt-ssh on processing targets
- Update target fix for salt-ssh and avoiding race condition on salt-ssh
event processing (bsc#1179831, bsc#1182281)
- Add notify beacon for Debian/Ubuntu systems
- Fix zmq bug that causes salt-call to freeze (bsc#1181368)


Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- SUSE Manager Server 4.0:

zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-2105=1

- SUSE Manager Retail Branch Server 4.0:

zypper in -t patch
SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-2105=1

- SUSE Manager Proxy 4.0:

zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-2105=1

- SUSE Linux Enterprise Server for SAP 15-SP1:

zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2021-2105=1

- SUSE Linux Enterprise Server 15-SP1-LTSS:

zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-2105=1

- SUSE Linux Enterprise Server 15-SP1-BCL:

zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-BCL-2021-2105=1

- SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS:

zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-2105=1

- SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS:

zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-2105=1

- SUSE Enterprise Storage 6:

zypper in -t patch SUSE-Storage-6-2021-2105=1

- SUSE CaaS Platform 4.0:

To install this update, use the SUSE CaaS Platform 'skuba' tool.
It
will inform you if it detects new updates and let you then trigger
updating of the complete cluster in a controlled way.



Package List:

- SUSE Manager Server 4.0 (ppc64le s390x x86_64):

python3-salt-3002.2-37.1
salt-3002.2-37.1
salt-api-3002.2-37.1
salt-cloud-3002.2-37.1
salt-doc-3002.2-37.1
salt-master-3002.2-37.1
salt-minion-3002.2-37.1
salt-proxy-3002.2-37.1
salt-ssh-3002.2-37.1
salt-standalone-formulas-configuration-3002.2-37.1
salt-syndic-3002.2-37.1
salt-transactional-update-3002.2-37.1

- SUSE Manager Server 4.0 (noarch):

salt-bash-completion-3002.2-37.1
salt-fish-completion-3002.2-37.1
salt-zsh-completion-3002.2-37.1

- SUSE Manager Retail Branch Server 4.0 (x86_64):

python3-salt-3002.2-37.1
salt-3002.2-37.1
salt-api-3002.2-37.1
salt-cloud-3002.2-37.1
salt-doc-3002.2-37.1
salt-master-3002.2-37.1
salt-minion-3002.2-37.1
salt-proxy-3002.2-37.1
salt-ssh-3002.2-37.1
salt-standalone-formulas-configuration-3002.2-37.1
salt-syndic-3002.2-37.1
salt-transactional-update-3002.2-37.1

- SUSE Manager Retail Branch Server 4.0 (noarch):

salt-bash-completion-3002.2-37.1
salt-fish-completion-3002.2-37.1
salt-zsh-completion-3002.2-37.1

- SUSE Manager Proxy 4.0 (noarch):

salt-bash-completion-3002.2-37.1
salt-fish-completion-3002.2-37.1
salt-zsh-completion-3002.2-37.1

- SUSE Manager Proxy 4.0 (x86_64):

python3-salt-3002.2-37.1
salt-3002.2-37.1
salt-api-3002.2-37.1
salt-cloud-3002.2-37.1
salt-doc-3002.2-37.1
salt-master-3002.2-37.1
salt-minion-3002.2-37.1
salt-proxy-3002.2-37.1
salt-ssh-3002.2-37.1
salt-standalone-formulas-configuration-3002.2-37.1
salt-syndic-3002.2-37.1
salt-transactional-update-3002.2-37.1

- SUSE Linux Enterprise Server for SAP 15-SP1 (ppc64le x86_64):

python3-salt-3002.2-37.1
salt-3002.2-37.1
salt-api-3002.2-37.1
salt-cloud-3002.2-37.1
salt-doc-3002.2-37.1
salt-master-3002.2-37.1
salt-minion-3002.2-37.1
salt-proxy-3002.2-37.1
salt-ssh-3002.2-37.1
salt-standalone-formulas-configuration-3002.2-37.1
salt-syndic-3002.2-37.1
salt-transactional-update-3002.2-37.1

- SUSE Linux Enterprise Server for SAP 15-SP1 (noarch):

salt-bash-completion-3002.2-37.1
salt-fish-completion-3002.2-37.1
salt-zsh-completion-3002.2-37.1

- SUSE Linux Enterprise Server 15-SP1-LTSS (aarch64 ppc64le s390x x86_64):

python3-salt-3002.2-37.1
salt-3002.2-37.1
salt-api-3002.2-37.1
salt-cloud-3002.2-37.1
salt-doc-3002.2-37.1
salt-master-3002.2-37.1
salt-minion-3002.2-37.1
salt-proxy-3002.2-37.1
salt-ssh-3002.2-37.1
salt-standalone-formulas-configuration-3002.2-37.1
salt-syndic-3002.2-37.1
salt-transactional-update-3002.2-37.1

- SUSE Linux Enterprise Server 15-SP1-LTSS (noarch):

salt-bash-completion-3002.2-37.1
salt-fish-completion-3002.2-37.1
salt-zsh-completion-3002.2-37.1

- SUSE Linux Enterprise Server 15-SP1-BCL (noarch):

salt-bash-completion-3002.2-37.1
salt-fish-completion-3002.2-37.1
salt-zsh-completion-3002.2-37.1

- SUSE Linux Enterprise Server 15-SP1-BCL (x86_64):

python3-salt-3002.2-37.1
salt-3002.2-37.1
salt-api-3002.2-37.1
salt-cloud-3002.2-37.1
salt-doc-3002.2-37.1
salt-master-3002.2-37.1
salt-minion-3002.2-37.1
salt-proxy-3002.2-37.1
salt-ssh-3002.2-37.1
salt-standalone-formulas-configuration-3002.2-37.1
salt-syndic-3002.2-37.1
salt-transactional-update-3002.2-37.1

- SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (aarch64
x86_64):

python3-salt-3002.2-37.1
salt-3002.2-37.1
salt-api-3002.2-37.1
salt-cloud-3002.2-37.1
salt-doc-3002.2-37.1
salt-master-3002.2-37.1
salt-minion-3002.2-37.1
salt-proxy-3002.2-37.1
salt-ssh-3002.2-37.1
salt-standalone-formulas-configuration-3002.2-37.1
salt-syndic-3002.2-37.1
salt-transactional-update-3002.2-37.1

- SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (noarch):

salt-bash-completion-3002.2-37.1
salt-fish-completion-3002.2-37.1
salt-zsh-completion-3002.2-37.1

- SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (aarch64
x86_64):

python3-salt-3002.2-37.1
salt-3002.2-37.1
salt-api-3002.2-37.1
salt-cloud-3002.2-37.1
salt-doc-3002.2-37.1
salt-master-3002.2-37.1
salt-minion-3002.2-37.1
salt-proxy-3002.2-37.1
salt-ssh-3002.2-37.1
salt-standalone-formulas-configuration-3002.2-37.1
salt-syndic-3002.2-37.1
salt-transactional-update-3002.2-37.1

- SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (noarch):

salt-bash-completion-3002.2-37.1
salt-fish-completion-3002.2-37.1
salt-zsh-completion-3002.2-37.1

- SUSE Enterprise Storage 6 (aarch64 x86_64):

python3-salt-3002.2-37.1
salt-3002.2-37.1
salt-api-3002.2-37.1
salt-cloud-3002.2-37.1
salt-doc-3002.2-37.1
salt-master-3002.2-37.1
salt-minion-3002.2-37.1
salt-proxy-3002.2-37.1
salt-ssh-3002.2-37.1
salt-standalone-formulas-configuration-3002.2-37.1
salt-syndic-3002.2-37.1
salt-transactional-update-3002.2-37.1

- SUSE Enterprise Storage 6 (noarch):

salt-bash-completion-3002.2-37.1
salt-fish-completion-3002.2-37.1
salt-zsh-completion-3002.2-37.1

- SUSE CaaS Platform 4.0 (noarch):

salt-bash-completion-3002.2-37.1
salt-fish-completion-3002.2-37.1
salt-zsh-completion-3002.2-37.1

- SUSE CaaS Platform 4.0 (x86_64):

python3-salt-3002.2-37.1
salt-3002.2-37.1
salt-api-3002.2-37.1
salt-cloud-3002.2-37.1
salt-doc-3002.2-37.1
salt-master-3002.2-37.1
salt-minion-3002.2-37.1
salt-proxy-3002.2-37.1
salt-ssh-3002.2-37.1
salt-standalone-formulas-configuration-3002.2-37.1
salt-syndic-3002.2-37.1
salt-transactional-update-3002.2-37.1


References:

https://www.suse.com/security/cve/CVE-2018-15750.html
https://www.suse.com/security/cve/CVE-2018-15751.html
https://www.suse.com/security/cve/CVE-2020-11651.html
https://www.suse.com/security/cve/CVE-2020-11652.html
https://www.suse.com/security/cve/CVE-2020-25592.html
https://www.suse.com/security/cve/CVE-2021-25315.html
https://www.suse.com/security/cve/CVE-2021-31607.html
https://bugzilla.suse.com/1171257
https://bugzilla.suse.com/1176293
https://bugzilla.suse.com/1179831
https://bugzilla.suse.com/1181368
https://bugzilla.suse.com/1182281
https://bugzilla.suse.com/1182293
https://bugzilla.suse.com/1182382
https://bugzilla.suse.com/1185092
https://bugzilla.suse.com/1185281
https://bugzilla.suse.com/1186674
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung