You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa salt

Sigurnosni nedostaci programskog paketa salt

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LSU

openSUSE Security Update: Security update for salt
______________________________________________________________________________

Announcement ID: openSUSE-SU-2020:1074-1
Rating: moderate
References: #1159284 #1165572 #1167437 #1168340 #1169604
#1170104 #1170288 #1171906 #1172075 #1173072
#1174165
Cross-References: CVE-2018-15750 CVE-2018-15751 CVE-2020-11651
CVE-2020-11652
Affected Products:
openSUSE Leap 15.1
______________________________________________________________________________

An update that solves four vulnerabilities and has 7 fixes
is now available.

Description:

This update for salt contains the following fixes:

– Fix for TypeError in Tornado importer (bsc#1174165)
– Require python3-distro only for TW (bsc#1173072)
– Update to Salt version 3000: See release notes:
https://docs.saltstack.com/en/latest/topics/releases/3000.html

– Add docker.logout to docker execution module. (bsc#1165572)
– Add option to enable/disable force refresh for zypper.
– Add publish_batch to ClearFuncs exposed methods.
– Adds test for zypper abbreviation fix.
– Avoid segfault from “salt-api” under certain conditions of heavy load
managing SSH minions. (bsc#1169604)
– Avoid traceback on debug logging for swarm module. (bsc#1172075)
– Batch mode now also correctly provides return value. (bsc#1168340)
– Better import cache handline.
– Do not make file.recurse state to fail when msgpack 0.5.4. (bsc#1167437)
– Do not require vendored backports-abc. (bsc#1170288)
– Fix errors from unit tests due NO_MOCK and NO_MOCK_REASON deprecation.
– Fix for low rpm_lowpkg unit test.
– Fix for temp folder definition in loader unit test.
– Fix for unless requisite when pip is not installed.
– Fix integration test failure for test_mod_del_repo_multiline_values.
– Fix regression in service states with reload argument.
– Fix tornado imports and missing _utils after rebasing patches.
– Fix status attribute issue in aptpkg test.
– Improved storage pool or network handling.
– loop: fix variable names for until_no_eval.
– Make “salt.ext.tornado.gen” to use “salt.ext.backports_abc” on Python 2.
– Make setup.py script not to require setuptools greater than 9.1.
– More robust remote port detection.
– Prevent sporious “salt-api” stuck processes when managing SSH minions.
because of logging deadlock. (bsc#1159284)
– Python3.8 compatibility changes.
– Removes unresolved merge conflict in yumpkg module.
– Returns a the list of IPs filtered by the optional network list.
– Revert broken changes to slspath made on Salt 3000
(saltstack/salt#56341). (bsc#1170104)
– Sanitize grains loaded from roster_grains.json cache during “state.pkg”.
– Various virt backports from 3000.2.
– zypperpkg: filter patterns that start with dot. (bsc#1171906)

This update was imported from the SUSE:SLE-15-SP1:Update update project.

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

– openSUSE Leap 15.1:

zypper in -t patch openSUSE-2020-1074=1

Package List:

– openSUSE Leap 15.1 (noarch):

salt-bash-completion-3000-lp151.5.21.1
salt-fish-completion-3000-lp151.5.21.1
salt-zsh-completion-3000-lp151.5.21.1

– openSUSE Leap 15.1 (x86_64):

python2-salt-3000-lp151.5.21.1
python3-salt-3000-lp151.5.21.1
salt-3000-lp151.5.21.1
salt-api-3000-lp151.5.21.1
salt-cloud-3000-lp151.5.21.1
salt-doc-3000-lp151.5.21.1
salt-master-3000-lp151.5.21.1
salt-minion-3000-lp151.5.21.1
salt-proxy-3000-lp151.5.21.1
salt-ssh-3000-lp151.5.21.1
salt-standalone-formulas-configuration-3000-lp151.5.21.1
salt-syndic-3000-lp151.5.21.1

References:

https://www.suse.com/security/cve/CVE-2018-15750.html
https://www.suse.com/security/cve/CVE-2018-15751.html
https://www.suse.com/security/cve/CVE-2020-11651.html
https://www.suse.com/security/cve/CVE-2020-11652.html
https://bugzilla.suse.com/1159284
https://bugzilla.suse.com/1165572
https://bugzilla.suse.com/1167437
https://bugzilla.suse.com/1168340
https://bugzilla.suse.com/1169604
https://bugzilla.suse.com/1170104
https://bugzilla.suse.com/1170288
https://bugzilla.suse.com/1171906
https://bugzilla.suse.com/1172075
https://bugzilla.suse.com/1173072
https://bugzilla.suse.com/1174165


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

AutorGoran Culibrk
Cert idNCERT-REF-2020-07-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostaci programskog paketa Chromium

Otkriveni su sigurnosni nedostaci u programskom paketu Chromium za operacijski sustav openSUSE. Otkriveni nedostaci potencijalnim napadačima omogućuju izazivanje DoS stanja,...

Close