SUSE 5026 Published by

A salt security update has been released for openSUSE Leap 15.1.



security-announce: openSUSE-SU-2020:1074-1: moderate: Security update for salt


openSUSE Security Update: Security update for salt
______________________________________________________________________________

Announcement ID: openSUSE-SU-2020:1074-1
Rating: moderate
References: #1159284 #1165572 #1167437 #1168340 #1169604
#1170104 #1170288 #1171906 #1172075 #1173072
#1174165
Cross-References: CVE-2018-15750 CVE-2018-15751 CVE-2020-11651
CVE-2020-11652
Affected Products:
openSUSE Leap 15.1
______________________________________________________________________________

An update that solves four vulnerabilities and has 7 fixes
is now available.

Description:

This update for salt contains the following fixes:

- Fix for TypeError in Tornado importer (bsc#1174165)
- Require python3-distro only for TW (bsc#1173072)
- Update to Salt version 3000: See release notes:
  https://docs.saltstack.com/en/latest/topics/releases/3000.html

- Add docker.logout to docker execution module. (bsc#1165572)
- Add option to enable/disable force refresh for zypper.
- Add publish_batch to ClearFuncs exposed methods.
- Adds test for zypper abbreviation fix.
- Avoid segfault from "salt-api" under certain conditions of heavy load
managing SSH minions. (bsc#1169604)
- Avoid traceback on debug logging for swarm module. (bsc#1172075)
- Batch mode now also correctly provides return value. (bsc#1168340)
- Better import cache handline.
- Do not make file.recurse state to fail when msgpack 0.5.4. (bsc#1167437)
- Do not require vendored backports-abc. (bsc#1170288)
- Fix errors from unit tests due NO_MOCK and NO_MOCK_REASON deprecation.
- Fix for low rpm_lowpkg unit test.
- Fix for temp folder definition in loader unit test.
- Fix for unless requisite when pip is not installed.
- Fix integration test failure for test_mod_del_repo_multiline_values.
- Fix regression in service states with reload argument.
- Fix tornado imports and missing _utils after rebasing patches.
- Fix status attribute issue in aptpkg test.
- Improved storage pool or network handling.
- loop: fix variable names for until_no_eval.
- Make "salt.ext.tornado.gen" to use "salt.ext.backports_abc" on Python 2.
- Make setup.py script not to require setuptools greater than 9.1.
- More robust remote port detection.
- Prevent sporious "salt-api" stuck processes when managing SSH minions.
because of logging deadlock. (bsc#1159284)
- Python3.8 compatibility changes.
- Removes unresolved merge conflict in yumpkg module.
- Returns a the list of IPs filtered by the optional network list.
- Revert broken changes to slspath made on Salt 3000
(saltstack/salt#56341). (bsc#1170104)
- Sanitize grains loaded from roster_grains.json cache during "state.pkg".
- Various virt backports from 3000.2.
- zypperpkg: filter patterns that start with dot. (bsc#1171906)

This update was imported from the SUSE:SLE-15-SP1:Update update project.

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 15.1:

zypper in -t patch openSUSE-2020-1074=1


Package List:

- openSUSE Leap 15.1 (noarch):

salt-bash-completion-3000-lp151.5.21.1
salt-fish-completion-3000-lp151.5.21.1
salt-zsh-completion-3000-lp151.5.21.1

- openSUSE Leap 15.1 (x86_64):

python2-salt-3000-lp151.5.21.1
python3-salt-3000-lp151.5.21.1
salt-3000-lp151.5.21.1
salt-api-3000-lp151.5.21.1
salt-cloud-3000-lp151.5.21.1
salt-doc-3000-lp151.5.21.1
salt-master-3000-lp151.5.21.1
salt-minion-3000-lp151.5.21.1
salt-proxy-3000-lp151.5.21.1
salt-ssh-3000-lp151.5.21.1
salt-standalone-formulas-configuration-3000-lp151.5.21.1
salt-syndic-3000-lp151.5.21.1

References:

  https://www.suse.com/security/cve/CVE-2018-15750.html
  https://www.suse.com/security/cve/CVE-2018-15751.html
  https://www.suse.com/security/cve/CVE-2020-11651.html
  https://www.suse.com/security/cve/CVE-2020-11652.html
  https://bugzilla.suse.com/1159284
  https://bugzilla.suse.com/1165572
  https://bugzilla.suse.com/1167437
  https://bugzilla.suse.com/1168340
  https://bugzilla.suse.com/1169604
  https://bugzilla.suse.com/1170104
  https://bugzilla.suse.com/1170288
  https://bugzilla.suse.com/1171906
  https://bugzilla.suse.com/1172075
  https://bugzilla.suse.com/1173072
  https://bugzilla.suse.com/1174165