Linux Security
    Linux Security
    Linux Security

    openSUSE: 2020:1074-1: moderate: salt

    Date
    143
    Posted By
    An update that solves four vulnerabilities and has 7 fixes is now available.
       openSUSE Security Update: Security update for salt
    ______________________________________________________________________________
    
    Announcement ID:    openSUSE-SU-2020:1074-1
    Rating:             moderate
    References:         #1159284 #1165572 #1167437 #1168340 #1169604 
                        #1170104 #1170288 #1171906 #1172075 #1173072 
                        #1174165 
    Cross-References:   CVE-2018-15750 CVE-2018-15751 CVE-2020-11651
                        CVE-2020-11652
    Affected Products:
                        openSUSE Leap 15.1
    ______________________________________________________________________________
    
       An update that solves four vulnerabilities and has 7 fixes
       is now available.
    
    Description:
    
       This update for salt contains the following fixes:
    
       - Fix for TypeError in Tornado importer (bsc#1174165)
       - Require python3-distro only for TW (bsc#1173072)
       - Update to Salt version 3000: See release notes:
         https://docs.saltstack.com/en/latest/topics/releases/3000.html
    
       - Add docker.logout to docker execution module. (bsc#1165572)
       - Add option to enable/disable force refresh for zypper.
       - Add publish_batch to ClearFuncs exposed methods.
       - Adds test for zypper abbreviation fix.
       - Avoid segfault from "salt-api" under certain conditions of heavy load
         managing SSH minions. (bsc#1169604)
       - Avoid traceback on debug logging for swarm module. (bsc#1172075)
       - Batch mode now also correctly provides return value. (bsc#1168340)
       - Better import cache handline.
       - Do not make file.recurse state to fail when msgpack 0.5.4. (bsc#1167437)
       - Do not require vendored backports-abc. (bsc#1170288)
       - Fix errors from unit tests due NO_MOCK and NO_MOCK_REASON deprecation.
       - Fix for low rpm_lowpkg unit test.
       - Fix for temp folder definition in loader unit test.
       - Fix for unless requisite when pip is not installed.
       - Fix integration test failure for test_mod_del_repo_multiline_values.
       - Fix regression in service states with reload argument.
       - Fix tornado imports and missing _utils after rebasing patches.
       - Fix status attribute issue in aptpkg test.
       - Improved storage pool or network handling.
       - loop: fix variable names for until_no_eval.
       - Make "salt.ext.tornado.gen" to use "salt.ext.backports_abc" on Python 2.
       - Make setup.py script not to require setuptools greater than 9.1.
       - More robust remote port detection.
       - Prevent sporious "salt-api" stuck processes when managing SSH minions.
         because of logging deadlock. (bsc#1159284)
       - Python3.8 compatibility changes.
       - Removes unresolved merge conflict in yumpkg module.
       - Returns a the list of IPs filtered by the optional network list.
       - Revert broken changes to slspath made on Salt 3000
         (saltstack/salt#56341). (bsc#1170104)
       - Sanitize grains loaded from roster_grains.json cache during "state.pkg".
       - Various virt backports from 3000.2.
       - zypperpkg: filter patterns that start with dot. (bsc#1171906)
    
       This update was imported from the SUSE:SLE-15-SP1:Update update project.
    
    
    Patch Instructions:
    
       To install this openSUSE Security Update use the SUSE recommended installation methods
       like YaST online_update or "zypper patch".
    
       Alternatively you can run the command listed for your product:
    
       - openSUSE Leap 15.1:
    
          zypper in -t patch openSUSE-2020-1074=1
    
    
    
    Package List:
    
       - openSUSE Leap 15.1 (noarch):
    
          salt-bash-completion-3000-lp151.5.21.1
          salt-fish-completion-3000-lp151.5.21.1
          salt-zsh-completion-3000-lp151.5.21.1
    
       - openSUSE Leap 15.1 (x86_64):
    
          python2-salt-3000-lp151.5.21.1
          python3-salt-3000-lp151.5.21.1
          salt-3000-lp151.5.21.1
          salt-api-3000-lp151.5.21.1
          salt-cloud-3000-lp151.5.21.1
          salt-doc-3000-lp151.5.21.1
          salt-master-3000-lp151.5.21.1
          salt-minion-3000-lp151.5.21.1
          salt-proxy-3000-lp151.5.21.1
          salt-ssh-3000-lp151.5.21.1
          salt-standalone-formulas-configuration-3000-lp151.5.21.1
          salt-syndic-3000-lp151.5.21.1
    
    
    References:
    
       https://www.suse.com/security/cve/CVE-2018-15750.html
       https://www.suse.com/security/cve/CVE-2018-15751.html
       https://www.suse.com/security/cve/CVE-2020-11651.html
       https://www.suse.com/security/cve/CVE-2020-11652.html
       https://bugzilla.suse.com/1159284
       https://bugzilla.suse.com/1165572
       https://bugzilla.suse.com/1167437
       https://bugzilla.suse.com/1168340
       https://bugzilla.suse.com/1169604
       https://bugzilla.suse.com/1170104
       https://bugzilla.suse.com/1170288
       https://bugzilla.suse.com/1171906
       https://bugzilla.suse.com/1172075
       https://bugzilla.suse.com/1173072
       https://bugzilla.suse.com/1174165
    
    -- 
    

    Advisories

    LinuxSecurity Poll

    How are you contributing to Open Source?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 4 answer(s).
    /main-polls/37-how-are-you-contributing-to-open-source?task=poll.vote&format=json
    37
    radio
    [{"id":"127","title":"I'm involved with the development of an open-source project(s).","votes":"1","type":"x","order":"1","pct":100,"resources":[]},{"id":"128","title":"I've reported vulnerabilities I've discovered in open-source code.","votes":"0","type":"x","order":"2","pct":0,"resources":[]},{"id":"129","title":"I've provided developers with feedback on their projects.","votes":"0","type":"x","order":"3","pct":0,"resources":[]},{"id":"130","title":"I've helped another community member get started contributing to Open Source.","votes":"0","type":"x","order":"4","pct":0,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350


    VIEW MORE POLLS

    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.