Oval Definition:oval:org.opensuse.security:def:73655
Revision Date:2021-06-21Version:1
Title:Security update for salt (Critical)
Description:

This update for salt fixes the following issues:

Update to Salt release version 3002.2 (jsc#ECO-3212, jsc#SLE-18033, jsc#SLE-18028)

* - Check if dpkgnotify is executable (bsc#1186674) - Drop support for Python2. Obsoletes `python2-salt` package (jsc#SLE-18028) - virt module updates * network: handle missing ipv4 netmask attribute * more network support * PCI/USB host devices passthrough support - Set distro requirement to oldest supported version in requirements/base.txt - Bring missing part of async batch implementation back (CVE-2021-25315, bsc#1182382) - Always require `python3-distro` (bsc#1182293) - Remove deprecated warning that breaks minion execution when 'server_id_use_crc' opts is missing - Fix pkg states when DEB package has 'all' arch - Do not force beacons configuration to be a list. - Remove msgpack < 1.0.0 from base requirements (bsc#1176293) - msgpack support for version >= 1.0.0 (bsc#1171257) - Fix issue parsing errors in ansiblegate state module - Prevent command injection in the snapper module (bsc#1185281, CVE-2021-31607) - transactional_update: detect recursion in the executor - Add subpackage salt-transactional-update (jsc#SLE-18033) - Improvements on 'ansiblegate' module (bsc#1185092): * New methods: ansible.targets / ansible.discover_playbooks - Add support for Alibaba Cloud Linux 2 (Aliyun Linux) - Regression fix of salt-ssh on processing targets - Update target fix for salt-ssh and avoiding race condition on salt-ssh event processing (bsc#1179831, bsc#1182281) - Add notify beacon for Debian/Ubuntu systems - Fix zmq bug that causes salt-call to freeze (bsc#1181368)
Family:unixClass:patch
Status:Reference(s):1171257
1175596
1176293
1177472
1178428
1179831
1181368
1182281
1182293
1182382
1185092
1185281
1186674
CVE-2013-2126
CVE-2013-2127
CVE-2015-8367
CVE-2017-13735
CVE-2017-14265
CVE-2017-14348
CVE-2017-6886
CVE-2017-6887
CVE-2017-6890
CVE-2017-6899
CVE-2018-10528
CVE-2018-10529
CVE-2018-15750
CVE-2018-15751
CVE-2018-20337
CVE-2018-20363
CVE-2018-20364
CVE-2018-20365
CVE-2018-5813
CVE-2018-5815
CVE-2018-5816
CVE-2018-5817
CVE-2018-5818
CVE-2018-5819
CVE-2020-11651
CVE-2020-11652
CVE-2020-14765
CVE-2020-14776
CVE-2020-14789
CVE-2020-14812
CVE-2020-15180
CVE-2020-25592
CVE-2021-25315
CVE-2021-31607
SUSE-SU-2020:3500-1
SUSE-SU-2021:2106-1
Platform(s):SUSE Linux Enterprise Desktop 15 SP2
SUSE Linux Enterprise High Performance Computing 15 SP2
SUSE Linux Enterprise Module for Basesystem 15 SP2
SUSE Linux Enterprise Server 15 SP2
SUSE Linux Enterprise Server for SAP Applications 15 SP2
SUSE Linux Enterprise Storage 7
SUSE Linux Enterprise Workstation Extension 15 SP2
SUSE Manager Proxy 4.1
SUSE Manager Server 4.1
Product(s):
Definition Synopsis
  • SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed
  • AND Package Information
  • libmariadb3-3.1.11-3.22 is installed
  • OR libmariadbprivate-3.1.11-3.22 is installed
  • OR mariadb-connector-c-3.1.11-3.22 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Workstation Extension 15 SP2 is installed
  • AND Package Information
  • libraw-devel-0.18.9-3.8 is installed
  • OR libraw16-0.18.9-3.8 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed
  • AND Package Information
  • python3-distro-1.5.0-3.5.1 is installed
  • OR python3-salt-3002.2-37.1 is installed
  • OR salt-3002.2-37.1 is installed
  • OR salt-bash-completion-3002.2-37.1 is installed
  • OR salt-doc-3002.2-37.1 is installed
  • OR salt-minion-3002.2-37.1 is installed
  • OR salt-zsh-completion-3002.2-37.1 is installed
  • BACK