QID 750688
Date Published: 2021-06-22
QID 750688: SUSE Enterprise Linux Security Update for salt (SUSE-SU-2021:2105-1)
This update for salt fixes the following issues: update to salt release version 3002.2 (jsc#eco-3212, jsc#sle-18033, jsc#sle-18028) - check if dpkgnotify is executable (bsc#1186674) - drop support for python2.
Obsoletes `python2-salt` package (jsc#sle-18028) - virt module updates * network: handle missing ipv4 netmask attribute * more network support * pci/usb host devices passthrough support - set distro requirement to oldest supported version in requirements/base.txt - bring missing part of async batch implementation back (bsc#1182382, cve-2021-25315) - always require python3-distro (bsc#1182293) - remove deprecated warning that breaks minion execution when "server_id_use_crc" opts is missing - fix pkg states when deb package has "all" arch - do not force beacons configuration to be a list.
- remove msgpack less than 1.0.0 from base requirements (bsc#1176293) - msgpack support for version greater than or equal 1.0.0 (bsc#1171257) - fix issue parsing errors in ansiblegate state module - prevent command injection in the snapper module (bsc#1185281, cve-2021-31607) - transactional_update: detect recursion in the executor - add subpackage salt-transactional-update (jsc#sle-18033) - remove duplicate directories from specfile - improvements on "ansiblegate" module (bsc#1185092): * new methods: ansible.targets / ansible.discover_playbooks - add support for alibaba cloud linux 2 (aliyun linux) - regression fix of salt-ssh on processing targets - update target fix for salt-ssh and avoiding race condition on salt-ssh event processing (bsc#1179831, bsc#1182281) - add notify beacon for debian/ubuntu systems - fix zmq bug that causes salt-call to freeze (bsc#1181368)
Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
Successful exploitation allows attacker to compromise the system.
- SUSE-SU-2021:2105-1 -
lists.suse.com/pipermail/sle-security-updates/2021-June/009057.html
CVEs related to QID 750688
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| SUSE-SU-2021:2105-1 | SUSE Enterprise Linux |
|