openSUSE: 2023:3862-1: moderate: salt Security Advisory Update
Description
This update for salt fixes the following issues: Security issues fixed: * CVE-2023-20897: Fixed DOS in minion return. (bsc#1214796, bsc#1213441) * CVE-2023-20898: Fixed Git Providers can read from the wrong environment because they get the same cache directory base name. (bsc#1214797, bsc#1193948) Bugs fixed: * Create minion_id with reproducible mtime * Fix broken tests to make them running in the testsuite * Fix detection of Salt codename by "salt_version" execution module * Fix inconsistency in reported version by egg-info metadata (bsc#1215489) * Fix regression: multiple values for keyword argument 'saltenv' (bsc#1212844) * Fix the regression of user.present state when group is unset (bsc#1212855) * Fix utf8 handling in 'pass' renderer and make it more robust * Fix zypper repositories always being reconfigured * Make sure configured user is properly set by Salt (bsc#1210994) * Prevent possible exceptions on salt.utils.user.get_group_dict (bsc#12127...
Read the Full Advisory
Patch
## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2023-3862=1 openSUSE-SLE-15.5-2023-3862=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2023-3862=1 * Server Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2023-3862=1 * Transactional Server Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Transactional-Server-15-SP5-2023-3862=1
Package List
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * salt-3006.0-150500.4.19.1 * python3-salt-3006.0-150500.4.19.1 * salt-syndic-3006.0-150500.4.19.1 * salt-proxy-3006.0-150500.4.19.1 * salt-tests-3006.0-150500.4.19.1 * salt-standalone-formulas-configuration-3006.0-150500.4.19.1 * salt-ssh-3006.0-150500.4.19.1 * salt-minion-3006.0-150500.4.19.1 * salt-doc-3006.0-150500.4.19.1 * salt-transactional-update-3006.0-150500.4.19.1 * salt-api-3006.0-150500.4.19.1 * salt-cloud-3006.0-150500.4.19.1 * salt-master-3006.0-150500.4.19.1 * openSUSE Leap 15.5 (noarch) * salt-zsh-completion-3006.0-150500.4.19.1 * salt-fish-completion-3006.0-150500.4.19.1 * salt-bash-completion-3006.0-150500.4.19.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * salt-minion-3006.0-150500.4.19.1 * salt-3006.0-150500.4.19.1 * salt-doc-3006.0-150500.4.19.1 * python3-salt-3006.0-150500.4.19.1 * Basesystem Module 15-SP5 (noarch) * salt-zsh-completion-3006.0-150500.4.19.1 * salt-bash-completion-3006.0-150500.4.19.1 * Server Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * salt-syndic-3006.0-150500.4.19.1 * salt-proxy-3006.0-150500.4.19.1 * salt-standalone-formulas-configuration-3006.0-150500.4.19.1 * salt-ssh-3006.0-150500.4.19.1 * salt-api-3006.0-150500.4.19.1 * salt-cloud-3006.0-150500.4.19.1 * salt-master-3006.0-150500.4.19.1 * Server Applications Module 15-SP5 (noarch) * salt-fish-completion-3006.0-150500.4.19.1 * Transactional Server Module 15-SP5 (aarch64 ppc64le s390x x86_64) * salt-transactional-update-3006.0-150500.4.19.1
References
* #1193948 * #1210994 * #1212794 * #1212844 * #1212855 * #1213257 * #1213441 * #1213630 * #1213960 * #1214796 * #1214797 * #1215489 ## References: * https://www.suse.com/security/cve/CVE-2023-20897.html * https://www.suse.com/security/cve/CVE-2023-20898.html * https://bugzilla.suse.com/show_bug.cgi?id=1193948 * https://bugzilla.suse.com/show_bug.cgi?id=1210994 * https://bugzilla.suse.com/show_bug.cgi?id=1212794 * https://bugzilla.suse.com/show_bug.cgi?id=1212844 * https://bugzilla.suse.com/show_bug.cgi?id=1212855 * https://bugzilla.suse.com/show_bug.cgi?id=1213257 * https://bugzilla.suse.com/show_bug.cgi?id=1213441 * https://bugzilla.suse.com/show_bug.cgi?id=1213630 * https://bugzilla.suse.com/show_bug.cgi?id=1213960 * https://bugzilla.suse.com/show_bug.cgi?id=1214796 * https://bugzilla.suse.com/show_bug.cgi?id=1214797 * https://bugzilla.suse.com/show_bug.cgi?id=1215489