File _patchinfo of Package patchinfo.9335

<patchinfo incident="9335">
  <issue tracker="bnc" id="1108834">pkg.installed fails when no repositories are configured</issue>
  <issue tracker="bnc" id="1113784">Test for group and create group fails when running from SUMA, works when run from client</issue>
  <issue tracker="bnc" id="1108995">pkg.install resolve_capabilities broken on python3</issue>
  <issue tracker="bnc" id="1113699">VUL-0: CVE-2018-15751: salt: remote authentication bypass in salt-api(netapi) allows to execute arbitrary commands</issue>
  <issue tracker="bnc" id="1108557">Salt is puzzled by %eth0 in IPv6 address of domain name server</issue>
  <issue tracker="bnc" id="1114824">cron.file broken: "Unable to manage file: manage_file() takes at least 11 arguments (10 given)"</issue>
  <issue tracker="bnc" id="1104491">Error encountered during module reload. Modules were not reloaded.</issue>
  <issue tracker="bnc" id="1114197">null value in column "server_arch_id"</issue>
  <issue tracker="bnc" id="1113698">VUL-0: CVE-2018-15750: salt: directory traversal vulnerability in salt-api</issue>
  <issue tracker="bnc" id="1107333">salt-cloud azurearm throws exception</issue>
  <issue tracker="bnc" id="1109893">Zypper shows no failure on package it cannot install</issue>
  <issue tracker="bnc" id="1112874">L3-Question: salt master + multiple ext_pillar - possible unexpected behaviour</issue>
  <issue tracker="bnc" id="1110938">salt-minion WARNING on restart sumautil.py &amp; module.run deprecated version Sodium</issue>
  <issue tracker="cve" id="2018-15750"/>
  <issue tracker="cve" id="2018-15751"/>
  <category>security</category>
  <rating>moderate</rating>
  <packager>mdinca</packager>
  <description>This update for salt fixes the following issues:

- Crontab module fix: file attributes option missing (boo#1114824)
- Fix git_pillar merging across multiple __env__ repositories (boo#1112874)
- Bugfix: unable to detect os arch when RPM is not installed (boo#1114197)
- Fix LDAP authentication issue when a valid token is generated
  by the salt-api even when invalid user credentials are passed.
  (U#48901)
- Improved handling of LDAP group id. gid is no longer treated as a
  string, which could have lead to faulty group creations. (boo#1113784)
- Fix remote command execution and incorrect access control
  when using salt-api. (boo#1113699) (CVE-2018-15751)
- Fix Directory traversal vulnerability when using salt-api.
  Allows an attacker to determine what files exist on
  a server when querying /run or /events. (boo#1113698) (CVE-2018-15750)
- Add multi-file support and globbing to the filetree (U#50018)
- Bugfix: supportconfig non-root permission issues (U#50095)
- Open profiles permissions to everyone for read-only
- Preserving signature in "module.run" state (U#50049)
- Install default salt-support profiles
- Remove unit test, came from a wrong branch. Fix merging failure.
- Add CPE_NAME for osversion* grain parsing
- Get os_family for RPM distros from the RPM macros
- Install support profiles
- Fix async call to process manager (boo#1110938)
- Salt-based supportconfig implementation (technology preview)
- Bugfix: any unicode string of length 16 will raise TypeError
- Fix IPv6 scope (boo#1108557)
- Handle zypper ZYPPER_EXIT_NO_REPOS exit code (boo#1108834, boo#1109893)
- Bugfix for pkg_resources crash (boo#1104491)
- Fix loosen azure sdk dependencies in azurearm cloud driver (boo#1107333)
- Fix broken "resolve_capabilities" on Python 3 (boo#1108995)
</description>
  <summary>Security update for salt</summary>
</patchinfo>
openSUSE Build Service is sponsored by