QID 750688

Date Published: 2021-06-22

QID 750688: SUSE Enterprise Linux Security Update for salt (SUSE-SU-2021:2105-1)

This update for salt fixes the following issues: update to salt release version 3002.2 (jsc#eco-3212, jsc#sle-18033, jsc#sle-18028) - check if dpkgnotify is executable (bsc#1186674) - drop support for python2.
Obsoletes `python2-salt` package (jsc#sle-18028) - virt module updates * network: handle missing ipv4 netmask attribute * more network support * pci/usb host devices passthrough support - set distro requirement to oldest supported version in requirements/base.txt - bring missing part of async batch implementation back (bsc#1182382, cve-2021-25315) - always require python3-distro (bsc#1182293) - remove deprecated warning that breaks minion execution when "server_id_use_crc" opts is missing - fix pkg states when deb package has "all" arch - do not force beacons configuration to be a list.
- remove msgpack less than 1.0.0 from base requirements (bsc#1176293) - msgpack support for version greater than or equal 1.0.0 (bsc#1171257) - fix issue parsing errors in ansiblegate state module - prevent command injection in the snapper module (bsc#1185281, cve-2021-31607) - transactional_update: detect recursion in the executor - add subpackage salt-transactional-update (jsc#sle-18033) - remove duplicate directories from specfile - improvements on "ansiblegate" module (bsc#1185092): * new methods: ansible.targets / ansible.discover_playbooks - add support for alibaba cloud linux 2 (aliyun linux) - regression fix of salt-ssh on processing targets - update target fix for salt-ssh and avoiding race condition on salt-ssh event processing (bsc#1179831, bsc#1182281) - add notify beacon for debian/ubuntu systems - fix zmq bug that causes salt-call to freeze (bsc#1181368)

Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation allows attacker to compromise the system.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as High - 7.5 severity.
  • Solution
    Upgrade to the latest package which contains the patch. To install this SUSE Security, Update use YaST online_update. Alternatively you can run the command listed for your product. To install packages using the command line interface, use command "yum update". Refer to Suse security advisory: SUSE-SU-2021:2105-1 to address this issue and obtain further details.
    Software Advisories
    Advisory ID Software Component Link
    SUSE-SU-2021:2105-1 SUSE Enterprise Linux URL Logo lists.suse.com/pipermail/sle-security-updates/2021-June/009057.html