SUSE-SU-2017:1581-1: moderate: Security update for Salt

sle-updates at lists.suse.com sle-updates at lists.suse.com
Fri Jun 16 10:11:01 MDT 2017


   SUSE Security Update: Security update for Salt
______________________________________________________________________________

Announcement ID:    SUSE-SU-2017:1581-1
Rating:             moderate
References:         #1011800 #1012999 #1017078 #1020831 #1022562 
                    #1025896 #1027240 #1027722 #1030009 #1030073 
                    #1032931 #1035912 #1035914 #1036125 #1038855 
                    #1039370 #1040584 #1040886 #1043111 
Cross-References:   CVE-2017-5200 CVE-2017-8109
Affected Products:
                    SUSE Linux Enterprise Server 11-SP4-CLIENT-TOOLS
                    SUSE Linux Enterprise Server 11-SP3-CLIENT-TOOLS
______________________________________________________________________________

   An update that solves two vulnerabilities and has 17 fixes
   is now available.

Description:


   This update for salt provides version 2016.11.4 and brings various fixes
   and improvements:

   - Adding a salt-minion watchdog for RHEL6 and SLES11 systems (sysV) to
     restart salt-minion in case of crashes during upgrade.
   - Fix format error. (bsc#1043111)
   - Fix ownership for whole master cache directory. (bsc#1035914)
   - Disable 3rd party runtime packages to be explicitly recommended.
     (bsc#1040886)
   - Fix insecure permissions in salt-ssh temporary files. (bsc#1035912,
     CVE-2017-8109)
   - Disable custom rosters for Salt SSH via Salt API. (bsc#1011800,
     CVE-2017-5200)
   - Orchestrate and batches don't return false failed information anymore.
   - Speed-up cherrypy by removing sleep call.
   - Fix os_family grains on SUSE. (bsc#1038855)
   - Fix setting the language on SUSE systems. (bsc#1038855)
   - Use SUSE specific salt-api.service. (bsc#1039370)
   - Fix using hostname for minion ID as '127'.
   - Fix core grains constants for timezone. (bsc#1032931)
   - Minor fixes on new pkg.list_downloaded.
   - Listing all type of advisory patches for Yum module.
   - Prevents zero length error on Python 2.6.
   - Fixes zypper test error after backporting.
   - Raet protocol is no longer supported. (bsc#1020831)
   - Fix moving SSH data to the new home. (bsc#1027722)
   - Fix logrotating /var/log/salt/minion. (bsc#1030009)
   - Fix result of master_tops extension is mutually overwritten.
     (bsc#1030073)
   - Allows to set 'timeout' and 'gather_job_timeout' via kwargs.
   - Allows to set custom timeouts for 'manage.up' and 'manage.status'.
   - Use salt's ordereddict for comparison.
   - Fix scripts for salt-proxy.
   - Add openscap module.
   - File.get_managed regression fix.
   - Fix translate variable arguments if they contain hidden keywords.
     (bsc#1025896)
   - Added unit test for dockerng.sls_build dryrun.
   - Added dryrun to dockerng.sls_build.
   - Update dockerng minimal version requirements.
   - Fix format error in error parsing.
   - Keep fix for migrating salt home directory. (bsc#1022562)
   - Fix  salt pkg.latest raises exception if package is not available.
     (bsc#1012999)
   - Timezone should always be in UTC. (bsc#1017078)
   - Fix timezone handling for rpm installtime. (bsc#1017078)
   - Increasing timeouts for running integrations tests.
   - Add buildargs option to dockerng.build module.
   - Fix error when missing ssh-option parameter.
   - Re-add yum notify plugin.
   - All kwargs to dockerng.create to provide all features to sls_build as
     well.
   - Datetime should be returned always in UTC.
   - Fix possible crash  while deserialising data on infinite recursion in
     scheduled state. (bsc#1036125)
   - Documentation refresh to 2016.11.4
   - For a detailed description, please refer to:
     + https://docs.saltstack.com/en/develop/topics/releases/2016.11.4.html
     + https://docs.saltstack.com/en/develop/topics/releases/2016.11.3.html
     + https://docs.saltstack.com/en/develop/topics/releases/2016.11.2.html
     + https://docs.saltstack.com/en/develop/topics/releases/2016.11.1.html


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Server 11-SP4-CLIENT-TOOLS:

      zypper in -t patch slesctsp4-salt-201705-13150=1

   - SUSE Linux Enterprise Server 11-SP3-CLIENT-TOOLS:

      zypper in -t patch slesctsp3-salt-201705-13150=1

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Server 11-SP4-CLIENT-TOOLS (i586 ia64 ppc64 s390x x86_64):

      salt-2016.11.4-42.2
      salt-doc-2016.11.4-42.2
      salt-minion-2016.11.4-42.2

   - SUSE Linux Enterprise Server 11-SP3-CLIENT-TOOLS (i586 ia64 ppc64 s390x x86_64):

      salt-2016.11.4-42.2
      salt-doc-2016.11.4-42.2
      salt-minion-2016.11.4-42.2


References:

   https://www.suse.com/security/cve/CVE-2017-5200.html
   https://www.suse.com/security/cve/CVE-2017-8109.html
   https://bugzilla.suse.com/1011800
   https://bugzilla.suse.com/1012999
   https://bugzilla.suse.com/1017078
   https://bugzilla.suse.com/1020831
   https://bugzilla.suse.com/1022562
   https://bugzilla.suse.com/1025896
   https://bugzilla.suse.com/1027240
   https://bugzilla.suse.com/1027722
   https://bugzilla.suse.com/1030009
   https://bugzilla.suse.com/1030073
   https://bugzilla.suse.com/1032931
   https://bugzilla.suse.com/1035912
   https://bugzilla.suse.com/1035914
   https://bugzilla.suse.com/1036125
   https://bugzilla.suse.com/1038855
   https://bugzilla.suse.com/1039370
   https://bugzilla.suse.com/1040584
   https://bugzilla.suse.com/1040886
   https://bugzilla.suse.com/1043111



More information about the sle-updates mailing list