![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.1.4.2020.1973.1 |
Category: | SuSE Local Security Checks |
Title: | SUSE: Security Advisory (SUSE-SU-2020:1973-1) |
Summary: | The remote host is missing an update for the 'Salt' package(s) announced via the SUSE-SU-2020:1973-1 advisory. |
Description: | Summary: The remote host is missing an update for the 'Salt' package(s) announced via the SUSE-SU-2020:1973-1 advisory. Vulnerability Insight: This update fixes the following issues: salt: - Fix for TypeError in Tornado importer (bsc#1174165) - Require python3-distro only for TW (bsc#1173072) - Various virt backports from 3000.2 - Avoid traceback on debug logging for swarm module (bsc#1172075) - Add publish_batch to ClearFuncs exposed methods - Update to salt version 3000 See release notes: [link moved to references] - Zypperpkg: filter patterns that start with dot (bsc#1171906) - Batch mode now also correctly provides return value (bsc#1168340) - Add docker.logout to docker execution module (bsc#1165572) - Testsuite fix - Add option to enable/disable force refresh for zypper - Python3.8 compatibility changes - Prevent sporious 'salt-api' stuck processes when managing SSH minions because of logging deadlock (bsc#1159284) - Avoid segfault from 'salt-api' under certain conditions of heavy load managing SSH minions (bsc#1169604) - Revert broken changes to slspath made on Salt 3000 (saltstack/salt#56341) (bsc#1170104) - Returns a the list of IPs filtered by the optional network list - Fix CVE-2020-11651 and CVE-2020-11652 (bsc#1170595) - Do not require vendored backports-abc (bsc#1170288) - Fix partition.mkpart to work without fstype (bsc#1169800) - Enable building and installation for Fedora - Disable python2 build on Tumbleweed We are removing the python2 interpreter from openSUSE (SLE16). As such disable salt building for python2 there. - More robust remote port detection - Sanitize grains loaded from roster_grains.json cache during 'state.pkg' - Do not make file.recurse state to fail when msgpack 0.5.4 (bsc#1167437) - Build: Buildequire pkgconfig(systemd) instead of systemd pkgconfig(systemd) is provided by systemd, so this is de-facto no change. But inside the Open Build Service (OBS), the same symbol is also provided by systemd-mini, which exists to shorten build-chains by only enabling what other packages need to successfully build - Add new custom SUSE capability for saltutil state module - Fixes status attribute issue in aptpkg test - Make setup.py script not to require setuptools greater than 9.1 - Loop: fix variable names for until_no_eval - Drop conflictive module.run state patch (bsc#1167437) - Update patches after rebase with upstream v3000 tag (bsc#1167437) - Fix some requirements issues depending on Python3 versions - Removes obsolete patch - Fix for low rpm_lowpkg unit test - Add python-singledispatch as dependency for python2-salt - Virt._get_domain: don't raise an exception if there is no VM - Fix for temp folder definition in loader unit test - Adds test for zypper abbreviation fix - Improved storage pool or network handling - Better import cache handline - Make 'salt.ext.tornado.gen' to use 'salt.ext.backports_abc' on Python 2 - Fix regression in service states with reload argument - Fix integration test failure for test_mod_del_repo_multiline_values - Fix for unless requisite when pip ... [Please see the references for more information on the vulnerabilities] Affected Software/OS: 'Salt' package(s) on SUSE Linux Enterprise Server 15, SUSE Linux Enterprise Server for SAP Applications 15. Solution: Please install the updated package(s). CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2019-18897 https://bugzilla.suse.com/show_bug.cgi?id=1157465 SuSE Security Announcement: openSUSE-SU-2020:0357 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00026.html Common Vulnerability Exposure (CVE) ID: CVE-2020-11651 Cisco Security Advisory: 20200528 SaltStack FrameWork Vulnerabilities Affecting Cisco Products https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-salt-2vx545AG Debian Security Information: DSA-4676 (Google Search) https://www.debian.org/security/2020/dsa-4676 http://packetstormsecurity.com/files/157560/Saltstack-3000.1-Remote-Code-Execution.html http://packetstormsecurity.com/files/157678/SaltStack-Salt-Master-Minion-Unauthenticated-Remote-Code-Execution.html https://docs.saltstack.com/en/latest/topics/releases/2019.2.4.html https://github.com/saltstack/salt/blob/v3000.2_docs/doc/topics/releases/3000.2.rst https://lists.debian.org/debian-lts-announce/2020/05/msg00027.html SuSE Security Announcement: openSUSE-SU-2020:0564 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00047.html SuSE Security Announcement: openSUSE-SU-2020:1074 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00070.html https://usn.ubuntu.com/4459-1/ Common Vulnerability Exposure (CVE) ID: CVE-2020-11652 http://support.blackberry.com/kb/articleDetail?articleNumber=000063758 |
Copyright | Copyright (C) 2021 Greenbone AG |
This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |