Security update for salt
Announcement ID: | SUSE-SU-2020:1974-1 |
---|---|
Rating: | moderate |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves four vulnerabilities and has seven security fixes can now be installed.
Description:
This update for salt contains the following fixes:
- Fix for TypeError in Tornado importer (bsc#1174165)
- Require python3-distro only for TW (bsc#1173072)
-
Update to Salt version 3000: See release notes: https://docs.saltstack.com/en/latest/topics/releases/3000.html
-
Add docker.logout to docker execution module. (bsc#1165572)
- Add option to enable/disable force refresh for zypper.
- Add publish_batch to ClearFuncs exposed methods.
- Adds test for zypper abbreviation fix.
- Avoid segfault from "salt-api" under certain conditions of heavy load managing SSH minions. (bsc#1169604)
- Avoid traceback on debug logging for swarm module. (bsc#1172075)
- Batch mode now also correctly provides return value. (bsc#1168340)
- Better import cache handline.
- Do not make file.recurse state to fail when msgpack 0.5.4. (bsc#1167437)
- Do not require vendored backports-abc. (bsc#1170288)
- Fix errors from unit tests due NO_MOCK and NO_MOCK_REASON deprecation.
- Fix for low rpm_lowpkg unit test.
- Fix for temp folder definition in loader unit test.
- Fix for unless requisite when pip is not installed.
- Fix integration test failure for test_mod_del_repo_multiline_values.
- Fix regression in service states with reload argument.
- Fix tornado imports and missing _utils after rebasing patches.
- Fix status attribute issue in aptpkg test.
- Improved storage pool or network handling.
- loop: fix variable names for until_no_eval.
- Make "salt.ext.tornado.gen" to use "salt.ext.backports_abc" on Python 2.
- Make setup.py script not to require setuptools greater than 9.1.
- More robust remote port detection.
- Prevent sporious "salt-api" stuck processes when managing SSH minions. because of logging deadlock. (bsc#1159284)
- Python3.8 compatibility changes.
- Removes unresolved merge conflict in yumpkg module.
- Returns a the list of IPs filtered by the optional network list.
- Revert broken changes to slspath made on Salt 3000 (saltstack/salt#56341). (bsc#1170104)
- Sanitize grains loaded from roster_grains.json cache during "state.pkg".
- Various virt backports from 3000.2.
- zypperpkg: filter patterns that start with dot. (bsc#1171906)
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
Basesystem Module 15-SP1
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP1-2020-1974=1
-
Python 2 Module 15-SP1
zypper in -t patch SUSE-SLE-Module-Python2-15-SP1-2020-1974=1
-
Server Applications Module 15-SP1
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP1-2020-1974=1
Package List:
-
Basesystem Module 15-SP1 (aarch64 ppc64le s390x x86_64)
- salt-doc-3000-6.37.1
- python3-salt-3000-6.37.1
- salt-minion-3000-6.37.1
- salt-3000-6.37.1
-
Basesystem Module 15-SP1 (noarch)
- salt-bash-completion-3000-6.37.1
- salt-zsh-completion-3000-6.37.1
-
Python 2 Module 15-SP1 (aarch64 ppc64le s390x x86_64)
- python2-salt-3000-6.37.1
-
Server Applications Module 15-SP1 (aarch64 ppc64le s390x x86_64)
- salt-cloud-3000-6.37.1
- salt-proxy-3000-6.37.1
- salt-syndic-3000-6.37.1
- salt-ssh-3000-6.37.1
- salt-api-3000-6.37.1
- salt-master-3000-6.37.1
- salt-standalone-formulas-configuration-3000-6.37.1
-
Server Applications Module 15-SP1 (noarch)
- salt-fish-completion-3000-6.37.1
References:
- https://www.suse.com/security/cve/CVE-2018-15750.html
- https://www.suse.com/security/cve/CVE-2018-15751.html
- https://www.suse.com/security/cve/CVE-2020-11651.html
- https://www.suse.com/security/cve/CVE-2020-11652.html
- https://bugzilla.suse.com/show_bug.cgi?id=1159284
- https://bugzilla.suse.com/show_bug.cgi?id=1165572
- https://bugzilla.suse.com/show_bug.cgi?id=1167437
- https://bugzilla.suse.com/show_bug.cgi?id=1168340
- https://bugzilla.suse.com/show_bug.cgi?id=1169604
- https://bugzilla.suse.com/show_bug.cgi?id=1170104
- https://bugzilla.suse.com/show_bug.cgi?id=1170288
- https://bugzilla.suse.com/show_bug.cgi?id=1171906
- https://bugzilla.suse.com/show_bug.cgi?id=1172075
- https://bugzilla.suse.com/show_bug.cgi?id=1173072
- https://bugzilla.suse.com/show_bug.cgi?id=1174165