Recommended update for Salt

SUSE Recommended Update: Recommended update for Salt
Announcement ID: SUSE-RU-2020:14320-1
Rating: moderate
References: #1135656 #1153611 #1157465 #1158940 #1159118 #1160931 #1162327 #1162504 #1165425
Affected Products:
  • SUSE Manager Ubuntu 18.04-CLIENT-TOOLS

An update that solves two vulnerabilities and has 7 fixes is now available.


This update fixes the following issues:

  • RHEL/CentOS 8 uses platform-python instead of python3
  • New configuration option for selection of grains in the minion start event.
  • Fix 'os_family' grain for Astra Linux Common Edition
  • Fix for salt-api NET API where unauthenticated attacker could run arbitrary code (CVE-2019-17361) (bsc#1162504)
  • Adds disabled parameter to mod_repo in aptpkg module
  • Move token with atomic operation
  • Bad API token files get deleted (bsc#1160931)
  • Support for Btrfs and XFS in parted and mkfs added
  • Adds list_downloaded for apt Module to enable pre-downloading support
  • Adds virt.(pool|network)_get_xml functions
  • Virt: adding kernel boot parameters to libvirt xml
  • Fix to scheduler when data['run'] does not exist (bsc#1159118)
  • Fix virt states to not fail on VMs already stopped
  • Fix applying of attributes for returner rawfile_json (bsc#1158940)
  • Xfs: do not fail if type is not present (bsc#1153611)
  • Don't use __python indirection macros on spec file %__python is no longer defined in RPM 4.15 (python2 is going EOL in Jan 2020); additionally, python/python3 are just binaries in the path.
  • Fix errors when running virt.get_hypervisor function
  • Align virt.full_info fixes with upstream Salt
  • Fix for log checking in x509 test
  • Prevent test_mod_del_repo_multiline_values to fail
  • Read repo info without using interpolation (bsc#1135656)
  • Replacing pycrypto with M2Crypto as dependency for >= SLE15 (bsc#1165425)
  • Batch Async: Handle exceptions, properly unregister and close instances after running async batching to avoid CPU starvation of the MWorkers (bsc#1162327)
  • Avoid possible user escalation upgrading salt-master (bsc#1157465) (CVE-2019-18897)

Patch Instructions:

To install this SUSE Recommended Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  • SUSE Manager Ubuntu 18.04-CLIENT-TOOLS:
    zypper in -t patch suse-ubu184ct-salt-202003-14320=1

Package List:

  • SUSE Manager Ubuntu 18.04-CLIENT-TOOLS (amd64):
    • python3-rpm-4.14.1+dfsg1-2.1~uyuni1
    • rpm-common-4.14.1+dfsg1-2.1~uyuni1
  • SUSE Manager Ubuntu 18.04-CLIENT-TOOLS (all):
    • salt-common-2019.2.0+ds-1.1+35.1
    • salt-minion-2019.2.0+ds-1.1+35.1