openSUSE: Security Advisory for salt (openSUSE-SU-2018:4197-1)

ID OPENVAS:1361412562310814578
Type openvas
Reporter Copyright (C) 2018 Greenbone Networks GmbH
Modified 2020-01-31T00:00:00


The remote host is missing an update for the

                                            # Copyright (C) 2018 Greenbone Networks GmbH
# Text descriptions are largely excerpted from the referenced
# advisory, and are Copyright (C) of their respective author(s)
# SPDX-License-Identifier: GPL-2.0-or-later
# This program is free software; you can redistribute it and/or
# modify it under the terms of the GNU General Public License
# as published by the Free Software Foundation; either version 2
# of the License, or (at your option) any later version.
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# GNU General Public License for more details.
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.

  script_cve_id("CVE-2018-15750", "CVE-2018-15751");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_tag(name:"last_modification", value:"2020-01-31 08:23:39 +0000 (Fri, 31 Jan 2020)");
  script_tag(name:"creation_date", value:"2018-12-20 07:33:59 +0100 (Thu, 20 Dec 2018)");
  script_name("openSUSE: Security Advisory for salt (openSUSE-SU-2018:4197-1)");
  script_copyright("Copyright (C) 2018 Greenbone Networks GmbH");
  script_family("SuSE Local Security Checks");
  script_mandatory_keys("ssh/login/suse", "ssh/login/rpms", re:"ssh/login/release=openSUSELeap42\.3");

  script_xref(name:"openSUSE-SU", value:"2018:4197-1");
  script_xref(name:"URL", value:"");

  script_tag(name:"summary", value:"The remote host is missing an update for the 'salt'
  package(s) announced via the openSUSE-SU-2018:4197-1 advisory.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable package version is present on the target host.");

  script_tag(name:"insight", value:"This update for salt fixes the following issues:

  - Crontab module fix: file attributes option missing (boo#1114824)

  - Fix git_pillar merging across multiple __env__ repositories (boo#1112874)

  - Bugfix: unable to detect os arch when RPM is not installed (boo#1114197)

  - Fix LDAP authentication issue when a valid token is generated by the
    salt-api even when invalid user credentials are passed. (U#48901)

  - Improved handling of LDAP group id. gid is no longer treated as a
    string, which could have lead to faulty group creations. (boo#1113784)

  - Fix remote command execution and incorrect access control when using
    salt-api. (boo#1113699) (CVE-2018-15751)

  - Fix Directory traversal vulnerability when using salt-api. Allows an
    attacker to determine what files exist on a server when querying /run or
    /events. (boo#1113698) (CVE-2018-15750)

  - Add multi-file support and globbing to the filetree (U#50018)

  - Bugfix: supportconfig non-root permission issues (U#50095)

  - Open profiles permissions to everyone for read-only

  - Preserving signature in '' state (U#50049)

  - Install default salt-support profiles

  - Remove unit test, came from a wrong branch. Fix merging failure.

  - Add CPE_NAME for osversion* grain parsing

  - Get os_family for RPM distros from the RPM macros

  - Install support profiles

  - Fix async call to process manager (boo#1110938)

  - Salt-based supportconfig implementation (technology preview)

  - Bugfix: any unicode string of length 16 will raise TypeError

  - Fix IPv6 scope (boo#1108557)

  - Handle zypper ZYPPER_EXIT_NO_REPOS exit code (boo#1108834, boo#1109893)

  - Bugfix for pkg_resources crash (boo#1104491)

  - Fix loosen azure sdk dependencies in azurearm cloud driver (boo#1107333)

  - Fix broken 'resolve_capabilities' on Python 3 (boo#1108995)

  Patch Instructions:

  To install this openSUSE Security Update use the SUSE recommended
  installation methods
  like YaST online_update or 'zypper patch'.

  Alternatively you can run the command listed for your product:

  - openSUSE Leap 42.3:

  zypper in -t patch openSUSE-2018-1574=1");

  script_tag(name:"affected", value:"salt on openSUSE Leap 42.3.");

  script_tag(name:"solution", value:"Please install the updated package(s).");

  script_tag(name:"solution_type", value:"VendorFix");
  script_tag(name:"qod_type", value:"package");



release = rpm_get_ssh_release();

res = "";
report = "";

if(release == "openSUSELeap42.3") {
  if(!isnull(res = isrpmvuln(pkg:"salt-bash-completion", rpm:"salt-bash-completion~2018.3.0~23.1", rls:"openSUSELeap42.3"))) {
    report += res;

  if(!isnull(res = isrpmvuln(pkg:"salt-fish-completion", rpm:"salt-fish-completion~2018.3.0~23.1", rls:"openSUSELeap42.3"))) {
    report += res;

  if(!isnull(res = isrpmvuln(pkg:"salt-zsh-completion", rpm:"salt-zsh-completion~2018.3.0~23.1", rls:"openSUSELeap42.3"))) {
    report += res;

  if(!isnull(res = isrpmvuln(pkg:"python2-salt", rpm:"python2-salt~2018.3.0~23.1", rls:"openSUSELeap42.3"))) {
    report += res;

  if(!isnull(res = isrpmvuln(pkg:"python3-salt", rpm:"python3-salt~2018.3.0~23.1", rls:"openSUSELeap42.3"))) {
    report += res;

  if(!isnull(res = isrpmvuln(pkg:"salt", rpm:"salt~2018.3.0~23.1", rls:"openSUSELeap42.3"))) {
    report += res;

  if(!isnull(res = isrpmvuln(pkg:"salt-api", rpm:"salt-api~2018.3.0~23.1", rls:"openSUSELeap42.3"))) {
    report += res;

  if(!isnull(res = isrpmvuln(pkg:"salt-cloud", rpm:"salt-cloud~2018.3.0~23.1", rls:"openSUSELeap42.3"))) {
    report += res;

  if(!isnull(res = isrpmvuln(pkg:"salt-doc", rpm:"salt-doc~2018.3.0~23.1", rls:"openSUSELeap42.3"))) {
    report += res;

  if(!isnull(res = isrpmvuln(pkg:"salt-master", rpm:"salt-master~2018.3.0~23.1", rls:"openSUSELeap42.3"))) {
    report += res;

  if(!isnull(res = isrpmvuln(pkg:"salt-minion", rpm:"salt-minion~2018.3.0~23.1", rls:"openSUSELeap42.3"))) {
    report += res;

  if(!isnull(res = isrpmvuln(pkg:"salt-proxy", rpm:"salt-proxy~2018.3.0~23.1", rls:"openSUSELeap42.3"))) {
    report += res;

  if(!isnull(res = isrpmvuln(pkg:"salt-ssh", rpm:"salt-ssh~2018.3.0~23.1", rls:"openSUSELeap42.3"))) {
    report += res;

  if(!isnull(res = isrpmvuln(pkg:"salt-syndic", rpm:"salt-syndic~2018.3.0~23.1", rls:"openSUSELeap42.3"))) {
    report += res;

  if(report != "") {
  } else if(__pkg_match) {