Oval Definition:oval:org.opensuse.security:def:69058
Revision Date:2021-06-21Version:1
Title:Security update for salt (Critical)
Description:

This update for salt fixes the following issues:

Update to Salt release version 3002.2 (jsc#ECO-3212, jsc#SLE-18033, jsc#SLE-18028)

* - Check if dpkgnotify is executable (bsc#1186674) - Drop support for Python2. Obsoletes `python2-salt` package (jsc#SLE-18028) - virt module updates * network: handle missing ipv4 netmask attribute * more network support * PCI/USB host devices passthrough support - Set distro requirement to oldest supported version in requirements/base.txt - Bring missing part of async batch implementation back (CVE-2021-25315, bsc#1182382) - Always require `python3-distro` (bsc#1182293) - Remove deprecated warning that breaks minion execution when 'server_id_use_crc' opts is missing - Fix pkg states when DEB package has 'all' arch - Do not force beacons configuration to be a list. - Remove msgpack < 1.0.0 from base requirements (bsc#1176293) - msgpack support for version >= 1.0.0 (bsc#1171257) - Fix issue parsing errors in ansiblegate state module - Prevent command injection in the snapper module (bsc#1185281, CVE-2021-31607) - transactional_update: detect recursion in the executor - Add subpackage salt-transactional-update (jsc#SLE-18033) - Improvements on 'ansiblegate' module (bsc#1185092): * New methods: ansible.targets / ansible.discover_playbooks - Add support for Alibaba Cloud Linux 2 (Aliyun Linux) - Regression fix of salt-ssh on processing targets - Update target fix for salt-ssh and avoiding race condition on salt-ssh event processing (bsc#1179831, bsc#1182281) - Add notify beacon for Debian/Ubuntu systems - Fix zmq bug that causes salt-call to freeze (bsc#1181368)
Family:unixClass:patch
Status:Reference(s):1132728
1132729
1132732
1133135
1171257
1175070
1175071
1176293
1178074
1179831
1181368
1182281
1182293
1182382
1185092
1185281
1186674
CVE-2018-15750
CVE-2018-15751
CVE-2018-3639
CVE-2019-2602
CVE-2019-2684
CVE-2019-2698
CVE-2020-11651
CVE-2020-11652
CVE-2020-11993
CVE-2020-25592
CVE-2020-9490
CVE-2021-25315
CVE-2021-31607
SUSE-SU-2019:1211-2
SUSE-SU-2021:2106-1
Platform(s):SUSE Linux Enterprise High Performance Computing 15 SP2
SUSE Linux Enterprise Module for Legacy Software 15 SP1
SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 SP1
SUSE Linux Enterprise Module for Server Applications 15 SP2
SUSE Linux Enterprise Server 15 SP2
SUSE Linux Enterprise Server for SAP Applications 15 SP2
SUSE Linux Enterprise Storage 7
SUSE Manager Proxy 4.1
SUSE Manager Server 4.1
Product(s):
Definition Synopsis
  • SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 SP1 is installed
  • AND Package Information
  • apache2-2.4.33-3.41 is installed
  • OR apache2-event-2.4.33-3.41 is installed
  • OR apache2-example-pages-2.4.33-3.41 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Module for Legacy Software 15 SP1 is installed
  • AND Package Information
  • java-1_8_0-openjdk-1.8.0.212-3.19 is installed
  • OR java-1_8_0-openjdk-demo-1.8.0.212-3.19 is installed
  • OR java-1_8_0-openjdk-devel-1.8.0.212-3.19 is installed
  • OR java-1_8_0-openjdk-headless-1.8.0.212-3.19 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed
  • AND Package Information
  • salt-api-3002.2-37.1 is installed
  • OR salt-cloud-3002.2-37.1 is installed
  • OR salt-fish-completion-3002.2-37.1 is installed
  • OR salt-master-3002.2-37.1 is installed
  • OR salt-proxy-3002.2-37.1 is installed
  • OR salt-ssh-3002.2-37.1 is installed
  • OR salt-standalone-formulas-configuration-3002.2-37.1 is installed
  • OR salt-syndic-3002.2-37.1 is installed
  • BACK