Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
SUSE:SLE-15-SP1:GA
patchinfo.14250
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.14250
<patchinfo incident="14250"> <zypp_restart_needed/> <rating>moderate</rating> <packager>juliogonzalezgil</packager> <category>recommended</category> <summary>Recommended update for Salt</summary> <description> This update fixes the following issues: salt: - RHEL/CentOS 8 uses platform-python instead of python3 - New configuration option for selection of grains in the minion start event. - Fix 'os_family' grain for Astra Linux Common Edition - Fix for salt-api NET API where unauthenticated attacker could run arbitrary code (CVE-2019-17361) (bsc#1162504) - Adds disabled parameter to mod_repo in aptpkg module - Move token with atomic operation - Bad API token files get deleted (bsc#1160931) - Support for Btrfs and XFS in parted and mkfs added - Adds list_downloaded for apt Module to enable pre-downloading support - Adds virt.(pool|network)_get_xml functions - Virt: adding kernel boot parameters to libvirt xml - Fix to scheduler when data['run'] does not exist (bsc#1159118) - Fix virt states to not fail on VMs already stopped - Fix applying of attributes for returner rawfile_json (bsc#1158940) - Xfs: do not fail if type is not present (bsc#1153611) - Don't use __python indirection macros on spec file %__python is no longer defined in RPM 4.15 (python2 is going EOL in Jan 2020); additionally, python/python3 are just binaries in the path. - Fix errors when running virt.get_hypervisor function - Align virt.full_info fixes with upstream Salt - Fix for log checking in x509 test - Prevent test_mod_del_repo_multiline_values to fail - Read repo info without using interpolation (bsc#1135656) - Replacing pycrypto with M2Crypto as dependency for >= SLE15 (bsc#1165425) - Batch Async: Handle exceptions, properly unregister and close instances after running async batching to avoid CPU starvation of the MWorkers (bsc#1162327) - Avoid possible user escalation upgrading salt-master (bsc#1157465) (CVE-2019-18897) </description> <issue tracker="bnc" id="1135656">Bootstrap incomplete for a minion that has repositories with %xx url-encoded characters in the URL</issue> <issue tracker="bnc" id="1153611">xfs.mkfs state failing with RES 7.6</issue> <issue tracker="bnc" id="1157465">VUL-0: CVE-2019-18897: salt: Local privilege escalation from salt to root</issue> <issue tracker="bnc" id="1158940">Issue with the rawfile_json returner</issue> <issue tracker="bnc" id="1159118">salt schedule.run_job crash on SLES12 SP4</issue> <issue tracker="bnc" id="1160931">L3: salt-master does not purge tokens in /var/lib/misc/salt/cache/salt-master/master/token</issue> <issue tracker="bnc" id="1162327">L3: salt-master worker thread errors</issue> <issue tracker="bnc" id="1162504">(CVE-2019-17361) VUL-0: CVE-2019-17361: salt: salt-api with the ssh client enabled is vulnerable to command injection</issue> <issue tracker="bnc" id="1165425">Replace pycrypto with M2Crypto as dependency for SLE15+</issue> <issue tracker="cve" id="2019-17361" /> <issue tracker="cve" id="2019-18897" /> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor