SUSE: 2020:1974-1 moderate: salt
Summary
This update for salt contains the following fixes: - Fix for TypeError in Tornado importer (bsc#1174165) - Require python3-distro only for TW (bsc#1173072) - Update to Salt version 3000: See release notes: https://docs.saltproject.io/en/latest/topics/releases/3000.html - Add docker.logout to docker execution module. (bsc#1165572) - Add option to enable/disable force refresh for zypper. - Add publish_batch to ClearFuncs exposed methods. - Adds test for zypper abbreviation fix. - Avoid segfault from "salt-api" under certain conditions of heavy load managing SSH minions. (bsc#1169604) - Avoid traceback on debug logging for swarm module. (bsc#1172075) - Batch mode now also correctly provides return value. (bsc#1168340) - Better import cache handline. - Do not make file.recurse state to fail when msgpack 0.5.4. (bsc#1167437) - Do not require vendored backports-abc. (bsc#1170288) - Fix errors from unit tests due NO_MOCK and NO_MOCK_REASON deprecation. - Fix for low rpm_lowpkg unit test. - Fix for temp folder definition in loader unit test. - Fix for unless requisite when pip is not installed. - Fix integration test failure for test_mod_del_repo_multiline_values. - Fix regression in service states with reload argument. - Fix tornado imports and missing _utils after rebasing patches. - Fix status attribute issue in aptpkg test. - Improved storage pool or network handling. - loop: fix variable names for until_no_eval. - Make "salt.ext.tornado.gen" to use "salt.ext.backports_abc" on Python 2. - Make setup.py script not to require setuptools greater than 9.1. - More robust remote port detection. - Prevent sporious "salt-api" stuck processes when managing SSH minions. because of logging deadlock. (bsc#1159284) - Python3.8 compatibility changes. - Removes unresolved merge conflict in yumpkg module. - Returns a the list of IPs filtered by the optional network list. - Revert broken changes to slspath made on Salt 3000 (saltstack/salt#56341). (bsc#1170104) - Sanitize grains loaded from roster_grains.json cache during "state.pkg". - Various virt backports from 3000.2. - zypperpkg: filter patterns that start with dot. (bsc#1171906) Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Module for Server Applications 15-SP1: zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP1-2020-1974=1 - SUSE Linux Enterprise Module for Python2 15-SP1: zypper in -t patch SUSE-SLE-Module-Python2-15-SP1-2020-1974=1 - SUSE Linux Enterprise Module for Basesystem 15-SP1: zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP1-2020-1974=1 Package List: - SUSE Linux Enterprise Module for Server Applications 15-SP1 (aarch64 ppc64le s390x x86_64): salt-api-3000-6.37.1 salt-cloud-3000-6.37.1 salt-master-3000-6.37.1 salt-proxy-3000-6.37.1 salt-ssh-3000-6.37.1 salt-standalone-formulas-configuration-3000-6.37.1 salt-syndic-3000-6.37.1 - SUSE Linux Enterprise Module for Server Applications 15-SP1 (noarch): salt-fish-completion-3000-6.37.1 - SUSE Linux Enterprise Module for Python2 15-SP1 (aarch64 ppc64le s390x x86_64): python2-salt-3000-6.37.1 - SUSE Linux Enterprise Module for Basesystem 15-SP1 (aarch64 ppc64le s390x x86_64): python3-salt-3000-6.37.1 salt-3000-6.37.1 salt-doc-3000-6.37.1 salt-minion-3000-6.37.1 - SUSE Linux Enterprise Module for Basesystem 15-SP1 (noarch): salt-bash-completion-3000-6.37.1 salt-zsh-completion-3000-6.37.1
References
#1159284 #1165572 #1167437 #1168340 #1169604
#1170104 #1170288 #1171906 #1172075 #1173072
#1174165
Cross- CVE-2018-15750 CVE-2018-15751 CVE-2020-11651
CVE-2020-11652
Affected Products:
SUSE Linux Enterprise Module for Server Applications 15-SP1
SUSE Linux Enterprise Module for Python2 15-SP1
SUSE Linux Enterprise Module for Basesystem 15-SP1
https://www.suse.com/security/cve/CVE-2018-15750.html
https://www.suse.com/security/cve/CVE-2018-15751.html
https://www.suse.com/security/cve/CVE-2020-11651.html
https://www.suse.com/security/cve/CVE-2020-11652.html
https://bugzilla.suse.com/1159284
https://bugzilla.suse.com/1165572
https://bugzilla.suse.com/1167437
https://bugzilla.suse.com/1168340
https://bugzilla.suse.com/1169604
https://bugzilla.suse.com/1170104
https://bugzilla.suse.com/1170288
https://bugzilla.suse.com/1171906
https://bugzilla.suse.com/1172075
https://bugzilla.suse.com/1173072
https://bugzilla.suse.com/1174165