Security update for salt
| Announcement ID: | SUSE-SU-2021:0627-1 | 
|---|---|
| Rating: | critical | 
| References: | |
| Cross-References: | |
| CVSS scores: | 
 | 
| Affected Products: | 
 | 
An update that solves 10 vulnerabilities and has two security fixes can now be installed.
Description:
This update for salt fixes the following issues:
- Fix regression on cmd.run when passing tuples as cmd (bsc#1182740)
- Allow extra_filerefsas sanitizedkwargsfor SSH client
- Fix errors with virt.update
- Fix for multiple for security issues (CVE-2020-28243) (CVE-2020-28972) (CVE-2020-35662) (CVE-2021-3148) (CVE-2021-3144) (CVE-2021-25281) (CVE-2021-25282) (CVE-2021-25283) (CVE-2021-25284) (CVE-2021-3197) (bsc#1181550) (bsc#1181556) (bsc#1181557) (bsc#1181558) (bsc#1181559) (bsc#1181560) (bsc#1181561) (bsc#1181562) (bsc#1181563) (bsc#1181564) (bsc#1181565)
- virt: search for grub.xenpath
- Xen spicevmc, DNS SRV records backports:
- Fix virtual network generated DNS XML for SRV records
- Don't add spicevmc channel to xen VMs
- virt UEFI fix: virt.update when efi=True
Special Instructions and Notes:
Patch Instructions:
        To install this SUSE  update use the SUSE recommended
        installation methods like YaST online_update or "zypper patch".
        Alternatively you can run the command listed for your product:
    
- 
                SUSE Manager Client Tools for SLE 12
                
                    
                        
 zypper in -t patch SUSE-SLE-Manager-Tools-12-2021-627=1
- 
                Advanced Systems Management Module 12
                
                    
                        
 zypper in -t patch SUSE-SLE-Module-Adv-Systems-Management-12-2021-627=1
- 
                SUSE Linux Enterprise Point of Service Image Server 12 12-SP2
                
                    
                        
 zypper in -t patch SUSE-SLE-POS-12-SP2-2021-627=1
Package List:
- 
                    SUSE Manager Client Tools for SLE 12 (aarch64 ppc64le s390x x86_64)
                    - salt-3000-46.129.1
- salt-minion-3000-46.129.1
- python2-salt-3000-46.129.1
- salt-doc-3000-46.129.1
- python3-salt-3000-46.129.1
 
- 
                    Advanced Systems Management Module 12 (ppc64le s390x x86_64)
                    - salt-api-3000-46.129.1
- salt-3000-46.129.1
- salt-cloud-3000-46.129.1
- salt-minion-3000-46.129.1
- python2-salt-3000-46.129.1
- salt-standalone-formulas-configuration-3000-46.129.1
- salt-doc-3000-46.129.1
- salt-master-3000-46.129.1
- salt-syndic-3000-46.129.1
- salt-proxy-3000-46.129.1
- salt-ssh-3000-46.129.1
 
- 
                    Advanced Systems Management Module 12 (noarch)
                    - salt-zsh-completion-3000-46.129.1
- salt-bash-completion-3000-46.129.1
 
- 
                    SUSE Linux Enterprise Point of Service Image Server 12 12-SP2 (x86_64)
                    - python2-salt-3000-46.129.1
- salt-3000-46.129.1
- salt-minion-3000-46.129.1
 
References:
- https://www.suse.com/security/cve/CVE-2020-28243.html
- https://www.suse.com/security/cve/CVE-2020-28972.html
- https://www.suse.com/security/cve/CVE-2020-35662.html
- https://www.suse.com/security/cve/CVE-2021-25281.html
- https://www.suse.com/security/cve/CVE-2021-25282.html
- https://www.suse.com/security/cve/CVE-2021-25283.html
- https://www.suse.com/security/cve/CVE-2021-25284.html
- https://www.suse.com/security/cve/CVE-2021-3144.html
- https://www.suse.com/security/cve/CVE-2021-3148.html
- https://www.suse.com/security/cve/CVE-2021-3197.html
- https://bugzilla.suse.com/show_bug.cgi?id=1181550
- https://bugzilla.suse.com/show_bug.cgi?id=1181556
- https://bugzilla.suse.com/show_bug.cgi?id=1181557
- https://bugzilla.suse.com/show_bug.cgi?id=1181558
- https://bugzilla.suse.com/show_bug.cgi?id=1181559
- https://bugzilla.suse.com/show_bug.cgi?id=1181560
- https://bugzilla.suse.com/show_bug.cgi?id=1181561
- https://bugzilla.suse.com/show_bug.cgi?id=1181562
- https://bugzilla.suse.com/show_bug.cgi?id=1181563
- https://bugzilla.suse.com/show_bug.cgi?id=1181564
- https://bugzilla.suse.com/show_bug.cgi?id=1181565
- https://bugzilla.suse.com/show_bug.cgi?id=1182740
