Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.4.2020.1973.1
Category:SuSE Local Security Checks
Title:SUSE: Security Advisory (SUSE-SU-2020:1973-1)
Summary:The remote host is missing an update for the 'Salt' package(s) announced via the SUSE-SU-2020:1973-1 advisory.
Description:Summary:
The remote host is missing an update for the 'Salt' package(s) announced via the SUSE-SU-2020:1973-1 advisory.

Vulnerability Insight:
This update fixes the following issues:

salt:

- Fix for TypeError in Tornado importer (bsc#1174165)
- Require python3-distro only for TW (bsc#1173072)
- Various virt backports from 3000.2
- Avoid traceback on debug logging for swarm module (bsc#1172075)
- Add publish_batch to ClearFuncs exposed methods
- Update to salt version 3000
See release notes: [link moved to references]
- Zypperpkg: filter patterns that start with dot (bsc#1171906)
- Batch mode now also correctly provides return value (bsc#1168340)
- Add docker.logout to docker execution module (bsc#1165572)
- Testsuite fix
- Add option to enable/disable force refresh for zypper
- Python3.8 compatibility changes
- Prevent sporious 'salt-api' stuck processes when managing SSH minions because of logging deadlock (bsc#1159284)
- Avoid segfault from 'salt-api' under certain conditions of heavy load managing SSH minions (bsc#1169604)
- Revert broken changes to slspath made on Salt 3000 (saltstack/salt#56341) (bsc#1170104)
- Returns a the list of IPs filtered by the optional network list
- Fix CVE-2020-11651 and CVE-2020-11652 (bsc#1170595)
- Do not require vendored backports-abc (bsc#1170288)
- Fix partition.mkpart to work without fstype (bsc#1169800)
- Enable building and installation for Fedora
- Disable python2 build on Tumbleweed
We are removing the python2 interpreter from openSUSE (SLE16).
As such disable salt building for python2 there.
- More robust remote port detection
- Sanitize grains loaded from roster_grains.json cache during 'state.pkg'
- Do not make file.recurse state to fail when msgpack 0.5.4 (bsc#1167437)
- Build: Buildequire pkgconfig(systemd) instead of systemd
pkgconfig(systemd) is provided by systemd, so this is de-facto no change.
But inside the Open Build Service (OBS), the same symbol is also provided by
systemd-mini, which exists to shorten build-chains by only enabling what other
packages need to successfully build
- Add new custom SUSE capability for saltutil state module
- Fixes status attribute issue in aptpkg test
- Make setup.py script not to require setuptools greater than 9.1
- Loop: fix variable names for until_no_eval
- Drop conflictive module.run state patch (bsc#1167437)
- Update patches after rebase with upstream v3000 tag (bsc#1167437)
- Fix some requirements issues depending on Python3 versions
- Removes obsolete patch
- Fix for low rpm_lowpkg unit test
- Add python-singledispatch as dependency for python2-salt
- Virt._get_domain: don't raise an exception if there is no VM
- Fix for temp folder definition in loader unit test
- Adds test for zypper abbreviation fix
- Improved storage pool or network handling
- Better import cache handline
- Make 'salt.ext.tornado.gen' to use 'salt.ext.backports_abc' on Python 2
- Fix regression in service states with reload argument
- Fix integration test failure for test_mod_del_repo_multiline_values
- Fix for unless requisite when pip ... [Please see the references for more information on the vulnerabilities]

Affected Software/OS:
'Salt' package(s) on SUSE Linux Enterprise Server 15, SUSE Linux Enterprise Server for SAP Applications 15.

Solution:
Please install the updated package(s).

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2019-18897
https://bugzilla.suse.com/show_bug.cgi?id=1157465
SuSE Security Announcement: openSUSE-SU-2020:0357 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00026.html
Common Vulnerability Exposure (CVE) ID: CVE-2020-11651
Cisco Security Advisory: 20200528 SaltStack FrameWork Vulnerabilities Affecting Cisco Products
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-salt-2vx545AG
Debian Security Information: DSA-4676 (Google Search)
https://www.debian.org/security/2020/dsa-4676
http://packetstormsecurity.com/files/157560/Saltstack-3000.1-Remote-Code-Execution.html
http://packetstormsecurity.com/files/157678/SaltStack-Salt-Master-Minion-Unauthenticated-Remote-Code-Execution.html
https://docs.saltstack.com/en/latest/topics/releases/2019.2.4.html
https://github.com/saltstack/salt/blob/v3000.2_docs/doc/topics/releases/3000.2.rst
https://lists.debian.org/debian-lts-announce/2020/05/msg00027.html
SuSE Security Announcement: openSUSE-SU-2020:0564 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00047.html
SuSE Security Announcement: openSUSE-SU-2020:1074 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00070.html
https://usn.ubuntu.com/4459-1/
Common Vulnerability Exposure (CVE) ID: CVE-2020-11652
http://support.blackberry.com/kb/articleDetail?articleNumber=000063758
CopyrightCopyright (C) 2021 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.