Recommended update for Salt
Announcement ID: | SUSE-RU-2020:0625-1 |
---|---|
Rating: | moderate |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves two vulnerabilities and has seven fixes can now be installed.
Description:
This update fixes the following issues:
salt:
- RHEL/CentOS 8 uses platform-python instead of python3
- New configuration option for selection of grains in the minion start event.
- Fix 'os_family' grain for Astra Linux Common Edition
- Fix for salt-api NET API where unauthenticated attacker could run arbitrary code (CVE-2019-17361) (bsc#1162504)
- Adds disabled parameter to mod_repo in aptpkg module
- Move token with atomic operation
- Bad API token files get deleted (bsc#1160931)
- Support for Btrfs and XFS in parted and mkfs added
- Adds list_downloaded for apt Module to enable pre-downloading support
- Adds virt.(pool|network)_get_xml functions
- Virt: adding kernel boot parameters to libvirt xml
- Fix to scheduler when data['run'] does not exist (bsc#1159118)
- Fix virt states to not fail on VMs already stopped
- Fix applying of attributes for returner rawfile_json (bsc#1158940)
- Xfs: do not fail if type is not present (bsc#1153611)
- Don't use __python indirection macros on spec file %__python is no longer defined in RPM 4.15 (python2 is going EOL in Jan 2020); additionally, python/python3 are just binaries in the path.
- Fix errors when running virt.get_hypervisor function
- Align virt.full_info fixes with upstream Salt
- Fix for log checking in x509 test
- Prevent test_mod_del_repo_multiline_values to fail
- Read repo info without using interpolation (bsc#1135656)
- Replacing pycrypto with M2Crypto as dependency for >= SLE15 (bsc#1165425)
- Batch Async: Handle exceptions, properly unregister and close instances after running async batching to avoid CPU starvation of the MWorkers (bsc#1162327)
- Avoid possible user escalation upgrading salt-master (bsc#1157465) (CVE-2019-18897)
Special Instructions and Notes:
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Server ESPOS 15
zypper in -t patch SUSE-SLE-Product-HPC-15-2020-625=1
-
SUSE Linux Enterprise High Performance Computing 15 LTSS 15
zypper in -t patch SUSE-SLE-Product-HPC-15-2020-625=1
-
SUSE Linux Enterprise Server 15 LTSS 15
zypper in -t patch SUSE-SLE-Product-SLES-15-2020-625=1
-
SUSE Linux Enterprise Server for SAP Applications 15
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-2020-625=1
Package List:
-
SUSE Linux Enterprise Server ESPOS 15 (aarch64 x86_64)
- salt-2019.2.0-5.64.1
- salt-minion-2019.2.0-5.64.1
- salt-syndic-2019.2.0-5.64.1
- salt-master-2019.2.0-5.64.1
- salt-ssh-2019.2.0-5.64.1
- salt-doc-2019.2.0-5.64.1
- python2-salt-2019.2.0-5.64.1
- salt-standalone-formulas-configuration-2019.2.0-5.64.1
- python3-salt-2019.2.0-5.64.1
- salt-cloud-2019.2.0-5.64.1
- salt-api-2019.2.0-5.64.1
- salt-proxy-2019.2.0-5.64.1
-
SUSE Linux Enterprise Server ESPOS 15 (noarch)
- salt-zsh-completion-2019.2.0-5.64.1
- salt-bash-completion-2019.2.0-5.64.1
- salt-fish-completion-2019.2.0-5.64.1
-
SUSE Linux Enterprise High Performance Computing 15 LTSS 15 (aarch64 x86_64)
- salt-2019.2.0-5.64.1
- salt-minion-2019.2.0-5.64.1
- salt-syndic-2019.2.0-5.64.1
- salt-master-2019.2.0-5.64.1
- salt-ssh-2019.2.0-5.64.1
- salt-doc-2019.2.0-5.64.1
- python2-salt-2019.2.0-5.64.1
- salt-standalone-formulas-configuration-2019.2.0-5.64.1
- python3-salt-2019.2.0-5.64.1
- salt-cloud-2019.2.0-5.64.1
- salt-api-2019.2.0-5.64.1
- salt-proxy-2019.2.0-5.64.1
-
SUSE Linux Enterprise High Performance Computing 15 LTSS 15 (noarch)
- salt-zsh-completion-2019.2.0-5.64.1
- salt-bash-completion-2019.2.0-5.64.1
- salt-fish-completion-2019.2.0-5.64.1
-
SUSE Linux Enterprise Server 15 LTSS 15 (aarch64 ppc64le s390x x86_64)
- salt-2019.2.0-5.64.1
- salt-minion-2019.2.0-5.64.1
- salt-syndic-2019.2.0-5.64.1
- salt-master-2019.2.0-5.64.1
- salt-ssh-2019.2.0-5.64.1
- salt-doc-2019.2.0-5.64.1
- python2-salt-2019.2.0-5.64.1
- salt-standalone-formulas-configuration-2019.2.0-5.64.1
- python3-salt-2019.2.0-5.64.1
- salt-cloud-2019.2.0-5.64.1
- salt-api-2019.2.0-5.64.1
- salt-proxy-2019.2.0-5.64.1
-
SUSE Linux Enterprise Server 15 LTSS 15 (noarch)
- salt-zsh-completion-2019.2.0-5.64.1
- salt-bash-completion-2019.2.0-5.64.1
- salt-fish-completion-2019.2.0-5.64.1
-
SUSE Linux Enterprise Server for SAP Applications 15 (ppc64le x86_64)
- salt-2019.2.0-5.64.1
- salt-minion-2019.2.0-5.64.1
- salt-syndic-2019.2.0-5.64.1
- salt-master-2019.2.0-5.64.1
- salt-ssh-2019.2.0-5.64.1
- salt-doc-2019.2.0-5.64.1
- python2-salt-2019.2.0-5.64.1
- salt-standalone-formulas-configuration-2019.2.0-5.64.1
- python3-salt-2019.2.0-5.64.1
- salt-cloud-2019.2.0-5.64.1
- salt-api-2019.2.0-5.64.1
- salt-proxy-2019.2.0-5.64.1
-
SUSE Linux Enterprise Server for SAP Applications 15 (noarch)
- salt-zsh-completion-2019.2.0-5.64.1
- salt-bash-completion-2019.2.0-5.64.1
- salt-fish-completion-2019.2.0-5.64.1
References:
- https://www.suse.com/security/cve/CVE-2019-17361.html
- https://www.suse.com/security/cve/CVE-2019-18897.html
- https://bugzilla.suse.com/show_bug.cgi?id=1135656
- https://bugzilla.suse.com/show_bug.cgi?id=1153611
- https://bugzilla.suse.com/show_bug.cgi?id=1157465
- https://bugzilla.suse.com/show_bug.cgi?id=1158940
- https://bugzilla.suse.com/show_bug.cgi?id=1159118
- https://bugzilla.suse.com/show_bug.cgi?id=1160931
- https://bugzilla.suse.com/show_bug.cgi?id=1162327
- https://bugzilla.suse.com/show_bug.cgi?id=1162504
- https://bugzilla.suse.com/show_bug.cgi?id=1165425