Revision Date: | 2021-10-27 | Version: | 1 |
Title: | (Moderate) |
Description: |
This update for salt fixes the following issues:
- CVE-2021-21996: Exclude the full path of a download URL to prevent injection of malicious code. (bsc#1190265)
|
Family: | unix | Class: | patch |
Status: | | Reference(s): | 1190265 CVE-2017-5715 CVE-2018-12126 CVE-2018-12127 CVE-2018-12130 CVE-2018-3639 CVE-2018-3640 CVE-2019-11091 CVE-2019-11135 CVE-2019-11139 CVE-2020-0543 CVE-2020-0548 CVE-2020-0549 CVE-2021-21996
|
Platform(s): | Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE SUSE Linux Enterprise Desktop 15 SP2 SUSE Linux Enterprise High Performance Computing 15 SP2 SUSE Linux Enterprise Module for Basesystem 15 SP2 SUSE Linux Enterprise Server 15 SP2 SUSE Linux Enterprise Server for SAP Applications 15 SP2 SUSE Linux Enterprise Storage 7 SUSE Manager Proxy 4.1 SUSE Manager Server 4.1
| Product(s): | |
Definition Synopsis |
SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed AND ucode-intel-20200602-1.2 is installed
|
Definition Synopsis |
Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE is installed
AND Package Information
python3-salt-3002.2-50.1.15.1 is installed
OR salt-3002.2-50.1.15.1 is installed
OR salt-api-3002.2-50.1.15.1 is installed
OR salt-master-3002.2-50.1.15.1 is installed
OR salt-minion-3002.2-50.1.15.1 is installed
|