SUSE-RU-2020:14319-1: moderate: Recommended update for Salt
sle-updates at lists.suse.com
sle-updates at lists.suse.com
Fri Mar 13 12:17:32 MDT 2020
SUSE Recommended Update: Recommended update for Salt
______________________________________________________________________________
Announcement ID: SUSE-RU-2020:14319-1
Rating: moderate
References: #1135656 #1153611 #1157465 #1158940 #1159118
#1160931 #1162327 #1162504 #1165425
Affected Products:
SUSE Manager Ubuntu 16.04-CLIENT-TOOLS
______________________________________________________________________________
An update that solves two vulnerabilities and has 7 fixes
is now available.
Description:
This update fixes the following issues:
salt:
- RHEL/CentOS 8 uses platform-python instead of python3
- New configuration option for selection of grains in the minion start
event.
- Fix 'os_family' grain for Astra Linux Common Edition
- Fix for salt-api NET API where unauthenticated attacker could run
arbitrary code (CVE-2019-17361) (bsc#1162504)
- Adds disabled parameter to mod_repo in aptpkg module
- Move token with atomic operation
- Bad API token files get deleted (bsc#1160931)
- Support for Btrfs and XFS in parted and mkfs added
- Adds list_downloaded for apt Module to enable pre-downloading support
- Adds virt.(pool|network)_get_xml functions
- Virt: adding kernel boot parameters to libvirt xml
- Fix to scheduler when data['run'] does not exist (bsc#1159118)
- Fix virt states to not fail on VMs already stopped
- Fix applying of attributes for returner rawfile_json (bsc#1158940)
- Xfs: do not fail if type is not present (bsc#1153611)
- Don't use __python indirection macros on spec file %__python is no
longer defined in RPM 4.15 (python2 is going EOL in Jan 2020);
additionally, python/python3 are just binaries in the path.
- Fix errors when running virt.get_hypervisor function
- Align virt.full_info fixes with upstream Salt
- Fix for log checking in x509 test
- Prevent test_mod_del_repo_multiline_values to fail
- Read repo info without using interpolation (bsc#1135656)
- Replacing pycrypto with M2Crypto as dependency for >= SLE15 (bsc#1165425)
- Batch Async: Handle exceptions, properly unregister and close instances
after running async batching to avoid CPU starvation of the MWorkers
(bsc#1162327)
- Avoid possible user escalation upgrading salt-master (bsc#1157465)
(CVE-2019-18897)
Patch Instructions:
To install this SUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- SUSE Manager Ubuntu 16.04-CLIENT-TOOLS:
zypper in -t patch suse-ubu164ct-salt-202003-14319=1
Package List:
- SUSE Manager Ubuntu 16.04-CLIENT-TOOLS (amd64):
librpmbuild3-4.12.0.1+dfsg1-3build3
librpmio3-4.12.0.1+dfsg1-3build3
librpmsign3-4.12.0.1+dfsg1-3build3
python3-rpm-4.12.0.1+dfsg1-3build3
rpm-common-4.12.0.1+dfsg1-3build3
- SUSE Manager Ubuntu 16.04-CLIENT-TOOLS (all):
salt-common-2019.2.0+ds-1.1+34.2
salt-minion-2019.2.0+ds-1.1+34.2
References:
https://www.suse.com/security/cve/CVE-2019-17361.html
https://www.suse.com/security/cve/CVE-2019-18897.html
https://bugzilla.suse.com/1135656
https://bugzilla.suse.com/1153611
https://bugzilla.suse.com/1157465
https://bugzilla.suse.com/1158940
https://bugzilla.suse.com/1159118
https://bugzilla.suse.com/1160931
https://bugzilla.suse.com/1162327
https://bugzilla.suse.com/1162504
https://bugzilla.suse.com/1165425
More information about the sle-updates
mailing list