[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256610

 
 

909

 
 

199263

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

SUSE-SU-2020:0684-1 -- SLES salt, python3-salt

ID: oval:org.secpod.oval:def:89050348Date: (C)2023-10-10   (M)2023-10-10
Class: PATCHFamily: unix




This update for salt fixes the following issues: - Avoid possible user escalation upgrading salt-master - Fix unit tests failures in test_batch_async tests - Batch Async: Handle exceptions, properly unregister and close instances after running async batching to avoid CPU starvation of the MWorkers - RHEL/CentOS 8 uses platform-python instead of python3 - New configuration option for selection of grains in the minion start event. - Fix "os_family" grain for Astra Linux Common Edition - Fix for salt-api NET API where unauthenticated attacker could run arbitrary code - Adds disabled parameter to mod_repo in aptpkg module Move token with atomic operation Bad API token files get deleted - Support for Btrfs and XFS in parted and mkfs added - Adds list_downloaded for apt Module to enable pre-downloading support Adds virt._get_xml functions - Various libvirt updates: * Add virt.pool_capabilities function * virt.pool_running improvements * Add virt.pool_deleted state * virt.network_define allow adding IP configuration - virt: adding kernel boot parameters to libvirt xml - Fix to scheduler when data["run"] does not exist - Fix virt states to not fail on VMs already stopped - Fix applying of attributes for returner rawfile_json - xfs: do not fail if type is not present - Fix errors when running virt.get_hypervisor function - Align virt.full_info fixes with upstream Salt - Fix for log checking in x509 test - Read repo info without using interpolation - Limiting M2Crypto to greater than = SLE15 - Replacing pycrypto with M2Crypto

Platform:
SUSE Linux Enterprise Desktop 15 SP1
SUSE Linux Enterprise Server 15 SP1
Product:
salt
python3-salt
Reference:
SUSE-SU-2020:0684-1
CVE-2019-17361
CVE-2019-18897
CVE    2
CVE-2019-18897
CVE-2019-17361
CPE    3
cpe:/a:saltstack:salt
cpe:/o:suse:suse_linux_enterprise_server:15:sp1
cpe:/a:python:python3-salt

© SecPod Technologies