Oval Definition:oval:org.opensuse.security:def:68747
Revision Date:2021-06-21Version:1
Title:Security update for salt (Critical)
Description:

This update for salt fixes the following issues:

Update to Salt release version 3002.2 (jsc#ECO-3212, jsc#SLE-18033, jsc#SLE-18028)

* - Check if dpkgnotify is executable (bsc#1186674) - Drop support for Python2. Obsoletes `python2-salt` package (jsc#SLE-18028) - virt module updates * network: handle missing ipv4 netmask attribute * more network support * PCI/USB host devices passthrough support - Set distro requirement to oldest supported version in requirements/base.txt - Bring missing part of async batch implementation back (CVE-2021-25315, bsc#1182382) - Always require `python3-distro` (bsc#1182293) - Remove deprecated warning that breaks minion execution when 'server_id_use_crc' opts is missing - Fix pkg states when DEB package has 'all' arch - Do not force beacons configuration to be a list. - Remove msgpack < 1.0.0 from base requirements (bsc#1176293) - msgpack support for version >= 1.0.0 (bsc#1171257) - Fix issue parsing errors in ansiblegate state module - Prevent command injection in the snapper module (bsc#1185281, CVE-2021-31607) - transactional_update: detect recursion in the executor - Add subpackage salt-transactional-update (jsc#SLE-18033) - Improvements on 'ansiblegate' module (bsc#1185092): * New methods: ansible.targets / ansible.discover_playbooks - Add support for Alibaba Cloud Linux 2 (Aliyun Linux) - Regression fix of salt-ssh on processing targets - Update target fix for salt-ssh and avoiding race condition on salt-ssh event processing (bsc#1179831, bsc#1182281) - Add notify beacon for Debian/Ubuntu systems - Fix zmq bug that causes salt-call to freeze (bsc#1181368)
Family:unixClass:patch
Status:Reference(s):1140868
1152856
1154212
1171257
1176293
1179831
1181368
1182281
1182293
1182382
1185092
1185281
1186674
CVE-2018-15750
CVE-2018-15751
CVE-2019-11709
CVE-2019-11711
CVE-2019-11712
CVE-2019-11713
CVE-2019-11715
CVE-2019-11717
CVE-2019-11719
CVE-2019-11729
CVE-2019-11730
CVE-2019-2894
CVE-2019-2933
CVE-2019-2945
CVE-2019-2949
CVE-2019-2958
CVE-2019-2962
CVE-2019-2964
CVE-2019-2973
CVE-2019-2975
CVE-2019-2977
CVE-2019-2978
CVE-2019-2981
CVE-2019-2983
CVE-2019-2987
CVE-2019-2988
CVE-2019-2989
CVE-2019-2992
CVE-2019-2999
CVE-2019-9811
CVE-2020-11651
CVE-2020-11652
CVE-2020-25592
CVE-2021-25315
CVE-2021-31607
SUSE-SU-2019:1869-1
SUSE-SU-2019:2998-1
SUSE-SU-2021:2106-1
Platform(s):SUSE Linux Enterprise Desktop 15 SP2
SUSE Linux Enterprise High Performance Computing 15 SP2
SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 SP1
SUSE Linux Enterprise Module for Python 2 15 SP2
SUSE Linux Enterprise Server 15 SP2
SUSE Linux Enterprise Server for SAP Applications 15 SP2
SUSE Linux Enterprise Storage 7
SUSE Manager Proxy 4.1
SUSE Manager Server 4.1
Product(s):
Definition Synopsis
  • SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 SP1 is installed
  • AND Package Information
  • MozillaFirefox-60.8.0-3.51 is installed
  • OR MozillaFirefox-branding-upstream-60.8.0-3.51 is installed
  • OR MozillaFirefox-buildsymbols-60.8.0-3.51 is installed
  • OR MozillaFirefox-devel-60.8.0-3.51 is installed
  • OR libfreebl3-hmac-32bit-3.44.1-3.16 is installed
  • OR libsoftokn3-hmac-32bit-3.44.1-3.16 is installed
  • OR mozilla-nss-3.44.1-3.16 is installed
  • OR mozilla-nss-sysinit-32bit-3.44.1-3.16 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Module for Python 2 15 SP2 is installed
  • AND python2-distro-1.5.0-3.5.1 is installed
  • BACK