Login
Newsletter
Werbung

Sicherheit: Zwei Probleme in salt
Aktuelle Meldungen Distributionen
Name: Zwei Probleme in salt
ID: openSUSE-SU-2020:0357-1
Distribution: SUSE
Plattformen: openSUSE Leap 15.1
Datum: Mi, 18. März 2020, 23:12
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17361
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18897
Applikationen: Salt

Originalnachricht

   openSUSE Security Update: Security update for salt
______________________________________________________________________________

Announcement ID: openSUSE-SU-2020:0357-1
Rating: moderate
References: #1135656 #1153611 #1157465 #1158940 #1159118
#1160931 #1162327 #1162504 #1165425
Cross-References: CVE-2019-17361 CVE-2019-18897
Affected Products:
openSUSE Leap 15.1
______________________________________________________________________________

An update that solves two vulnerabilities and has 7 fixes
is now available.

Description:

This update for salt fixes the following issues:

- Avoid possible user escalation upgrading salt-master (bsc#1157465)
(CVE-2019-18897)
- Fix unit tests failures in test_batch_async tests
- Batch Async: Handle exceptions, properly unregister and close instances
after running async batching to avoid CPU starvation of the MWorkers
(bsc#1162327)
- RHEL/CentOS 8 uses platform-python instead of python3
- New configuration option for selection of grains in the minion start
event.
- Fix 'os_family' grain for Astra Linux Common Edition
- Fix for salt-api NET API where unauthenticated attacker could run
arbitrary code (CVE-2019-17361) (bsc#1162504)
- Adds disabled parameter to mod_repo in aptpkg module Move token with
atomic operation Bad API token files get deleted (bsc#1160931)
- Support for Btrfs and XFS in parted and mkfs added
- Adds list_downloaded for apt Module to enable pre-downloading support
Adds virt.(pool|network)_get_xml functions
- Various libvirt updates:
* Add virt.pool_capabilities function
* virt.pool_running improvements
* Add virt.pool_deleted state
* virt.network_define allow adding IP configuration
- virt: adding kernel boot parameters to libvirt xml
- Fix to scheduler when data['run'] does not exist (bsc#1159118)
- Fix virt states to not fail on VMs already stopped
- Fix applying of attributes for returner rawfile_json (bsc#1158940)
- xfs: do not fail if type is not present (bsc#1153611)
- Fix errors when running virt.get_hypervisor function
- Align virt.full_info fixes with upstream Salt
- Fix for log checking in x509 test
- Read repo info without using interpolation (bsc#1135656)
- Limiting M2Crypto to >= SLE15
- Replacing pycrypto with M2Crypto (bsc#1165425)

This update was imported from the SUSE:SLE-15-SP1:Update update project.


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended
installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 15.1:

zypper in -t patch openSUSE-2020-357=1



Package List:

- openSUSE Leap 15.1 (x86_64):

python2-salt-2019.2.0-lp151.5.12.1
python3-salt-2019.2.0-lp151.5.12.1
salt-2019.2.0-lp151.5.12.1
salt-api-2019.2.0-lp151.5.12.1
salt-cloud-2019.2.0-lp151.5.12.1
salt-doc-2019.2.0-lp151.5.12.1
salt-master-2019.2.0-lp151.5.12.1
salt-minion-2019.2.0-lp151.5.12.1
salt-proxy-2019.2.0-lp151.5.12.1
salt-ssh-2019.2.0-lp151.5.12.1
salt-standalone-formulas-configuration-2019.2.0-lp151.5.12.1
salt-syndic-2019.2.0-lp151.5.12.1

- openSUSE Leap 15.1 (noarch):

salt-bash-completion-2019.2.0-lp151.5.12.1
salt-fish-completion-2019.2.0-lp151.5.12.1
salt-zsh-completion-2019.2.0-lp151.5.12.1


References:

https://www.suse.com/security/cve/CVE-2019-17361.html
https://www.suse.com/security/cve/CVE-2019-18897.html
https://bugzilla.suse.com/1135656
https://bugzilla.suse.com/1153611
https://bugzilla.suse.com/1157465
https://bugzilla.suse.com/1158940
https://bugzilla.suse.com/1159118
https://bugzilla.suse.com/1160931
https://bugzilla.suse.com/1162327
https://bugzilla.suse.com/1162504
https://bugzilla.suse.com/1165425

--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung