Описание
Security update for Salt
This update fixes the following issues:
salt:
- Fix for TypeError in Tornado importer (bsc#1174165)
- Require python3-distro only for TW (bsc#1173072)
- Various virt backports from 3000.2
- Avoid traceback on debug logging for swarm module (bsc#1172075)
- Add publish_batch to ClearFuncs exposed methods
- Update to salt version 3000 See release notes: https://docs.saltstack.com/en/latest/topics/releases/3000.html
- Zypperpkg: filter patterns that start with dot (bsc#1171906)
- Batch mode now also correctly provides return value (bsc#1168340)
- Add docker.logout to docker execution module (bsc#1165572)
- Testsuite fix
- Add option to enable/disable force refresh for zypper
- Python3.8 compatibility changes
- Prevent sporious 'salt-api' stuck processes when managing SSH minions because of logging deadlock (bsc#1159284)
- Avoid segfault from 'salt-api' under certain conditions of heavy load managing SSH minions (bsc#1169604)
- Revert broken changes to slspath made on Salt 3000 (saltstack/salt#56341) (bsc#1170104)
- Returns a the list of IPs filtered by the optional network list
- Fix CVE-2020-11651 and CVE-2020-11652 (bsc#1170595)
- Do not require vendored backports-abc (bsc#1170288)
- Fix partition.mkpart to work without fstype (bsc#1169800)
- Enable building and installation for Fedora
- Disable python2 build on Tumbleweed We are removing the python2 interpreter from openSUSE (SLE16). As such disable salt building for python2 there.
- More robust remote port detection
- Sanitize grains loaded from roster_grains.json cache during 'state.pkg'
- Do not make file.recurse state to fail when msgpack 0.5.4 (bsc#1167437)
- Build: Buildequire pkgconfig(systemd) instead of systemd pkgconfig(systemd) is provided by systemd, so this is de-facto no change. But inside the Open Build Service (OBS), the same symbol is also provided by systemd-mini, which exists to shorten build-chains by only enabling what other packages need to successfully build
- Add new custom SUSE capability for saltutil state module
- Fixes status attribute issue in aptpkg test
- Make setup.py script not to require setuptools greater than 9.1
- Loop: fix variable names for until_no_eval
- Drop conflictive module.run state patch (bsc#1167437)
- Update patches after rebase with upstream v3000 tag (bsc#1167437)
- Fix some requirements issues depending on Python3 versions
- Removes obsolete patch
- Fix for low rpm_lowpkg unit test
- Add python-singledispatch as dependency for python2-salt
- Virt._get_domain: don't raise an exception if there is no VM
- Fix for temp folder definition in loader unit test
- Adds test for zypper abbreviation fix
- Improved storage pool or network handling
- Better import cache handline
- Make 'salt.ext.tornado.gen' to use 'salt.ext.backports_abc' on Python 2
- Fix regression in service states with reload argument
- Fix integration test failure for test_mod_del_repo_multiline_values
- Fix for unless requisite when pip is not installed
- Fix errors from unit tests due NO_MOCK and NO_MOCK_REASON deprecation
- Fix tornado imports and missing _utils after rebasing patches
- Removes unresolved merge conflict in yumpkg module
- Use full option name instead of undocumented abbreviation for zypper
- Requiring python3-distro only for openSUSE/SLE >= 15 and not for Python 2 builds
- Avoid possible user escalation upgrading salt-master (bsc#1157465) (CVE-2019-18897)
- Fix unit tests failures in test_batch_async tests
- Batch Async: Handle exceptions, properly unregister and close instances after running async batching to avoid CPU starvation of the MWorkers (bsc#1162327)
- RHEL/CentOS 8 uses platform-python instead of python3
- Loader: invalidate the import cachefor extra modules
- Zypperpkg: filter patterns that start with dot (bsc#1171906)
- Batch mode now also correctly provides return value (bsc#1168340)
- Add docker.logout to docker execution module (bsc#1165572)
- Improvements for chroot module
- Add option to enable/disable force refresh for zypper
- Prevent sporious 'salt-api' stuck processes when managing SSH minions because of logging deadlock (bsc#1159284)
- Avoid segfault from 'salt-api' under certain conditions of heavy load managing SSH minions (bsc#1169604)
Список пакетов
Image SLES12-SP4-Azure-BYOS
Image SLES12-SP4-EC2-HVM-BYOS
Image SLES12-SP4-GCE-BYOS
Image SLES12-SP4-SAP-Azure-BYOS
Image SLES12-SP4-SAP-EC2-HVM-BYOS
Image SLES12-SP4-SAP-GCE-BYOS
Image SLES12-SP5-Azure-BYOS
Image SLES12-SP5-Azure-HPC-BYOS
Image SLES12-SP5-Azure-SAP-BYOS
Image SLES12-SP5-EC2-BYOS
Image SLES12-SP5-EC2-SAP-BYOS
Image SLES12-SP5-GCE-BYOS
Image SLES12-SP5-GCE-SAP-BYOS
SUSE Linux Enterprise Module for Advanced Systems Management 12
SUSE Linux Enterprise Point of Sale 12 SP2
SUSE Manager Client Tools 12
SUSE Manager Proxy 3.2
SUSE Manager Server 3.2
Ссылки
- Link for SUSE-SU-2020:1971-1
- E-Mail link for SUSE-SU-2020:1971-1
- SUSE Security Ratings
- SUSE Bug 1157465
- SUSE Bug 1159284
- SUSE Bug 1162327
- SUSE Bug 1165572
- SUSE Bug 1167437
- SUSE Bug 1168340
- SUSE Bug 1169604
- SUSE Bug 1169800
- SUSE Bug 1170104
- SUSE Bug 1170288
- SUSE Bug 1170595
- SUSE Bug 1171906
- SUSE Bug 1172075
- SUSE Bug 1173072
- SUSE Bug 1174165
- SUSE CVE CVE-2019-18897 page
- SUSE CVE CVE-2020-11651 page
Описание
A UNIX Symbolic Link (Symlink) Following vulnerability in the packaging of salt of SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server 15; openSUSE Factory allows local attackers to escalate privileges from user salt to root. This issue affects: SUSE Linux Enterprise Server 12 salt-master version 2019.2.0-46.83.1 and prior versions. SUSE Linux Enterprise Server 15 salt-master version 2019.2.0-6.21.1 and prior versions. openSUSE Factory salt-master version 2019.2.2-3.1 and prior versions.
Затронутые продукты
Ссылки
- CVE-2019-18897
- SUSE Bug 1157465
Описание
An issue was discovered in SaltStack Salt before 2019.2.4 and 3000 before 3000.2. The salt-master process ClearFuncs class does not properly validate method calls. This allows a remote user to access some methods without authentication. These methods can be used to retrieve user tokens from the salt master and/or run arbitrary commands on salt minions.
Затронутые продукты
Ссылки
- CVE-2020-11651
- SUSE Bug 1170595
Описание
An issue was discovered in SaltStack Salt before 2019.2.4 and 3000 before 3000.2. The salt-master process ClearFuncs class allows access to some methods that improperly sanitize paths. These methods allow arbitrary directory access to authenticated users.
Затронутые продукты
Ссылки
- CVE-2020-11652
- SUSE Bug 1170595