openSUSE Security Update : salt (openSUSE-2017-1016)

critical Nessus Plugin ID 103154

Language:

Synopsis

The remote openSUSE host is missing a security update.

Description

This update for salt fixes the following issues :

- Update to 2017.7.1 See https://docs.saltstack.com/en/develop/topics/releases/20 17.7.1.html for full changelog

- CVE-2017-12791: crafted minion ID could lead directory traversal on the Salt-master (boo#1053955)



- Run fdupes over all of /usr because it still warns about duplicate files. Remove ancient suse_version > 1020 conditional.

- Replace unnecessary %__ indirections. Use grep -q in favor of >/dev/null.

- Avoid bashisms in %pre.

- Update to 2017.7.0 See https://docs.saltstack.com/en/develop/topics/releases/20 17.7.0.html for full changelog

- fix ownership for whole master cache directory (boo#1035914)

- fix setting the language on SUSE systems (boo#1038855)

- wrong os_family grains on SUSE - fix unittests (boo#1038855)

- speed-up cherrypy by removing sleep call

- Disable 3rd party runtime packages to be explicitly recommended. (boo#1040886)

- fix format error (boo#1043111)

- Add a salt-minion watchdog for RHEL6 and SLES11 systems (sysV) to restart salt-minion in case of crashes during upgrade.

- Add procps as dependency.

- Bugfix: jobs scheduled to run at a future time stay pending for Salt minions (boo#1036125)

Solution

Update the affected salt packages.

See Also

https://bugzilla.opensuse.org/show_bug.cgi?id=1035914

https://bugzilla.opensuse.org/show_bug.cgi?id=1036125

https://bugzilla.opensuse.org/show_bug.cgi?id=1038855

https://bugzilla.opensuse.org/show_bug.cgi?id=1040886

https://bugzilla.opensuse.org/show_bug.cgi?id=1043111

https://bugzilla.opensuse.org/show_bug.cgi?id=1053955

https://docs.saltstack.com/en/develop/topics/releases/2017.7.0.html

https://docs.saltstack.com/en/develop/topics/releases/2017.7.1.html

Plugin Details

Severity: Critical

ID: 103154

File Name: openSUSE-2017-1016.nasl

Version: 3.7

Type: local

Agent: unix

Published: 9/13/2017

Updated: 1/19/2021

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:salt, p-cpe:/a:novell:opensuse:salt-api, p-cpe:/a:novell:opensuse:salt-bash-completion, p-cpe:/a:novell:opensuse:salt-cloud, p-cpe:/a:novell:opensuse:salt-fish-completion, p-cpe:/a:novell:opensuse:salt-master, p-cpe:/a:novell:opensuse:salt-minion, p-cpe:/a:novell:opensuse:salt-proxy, p-cpe:/a:novell:opensuse:salt-ssh, p-cpe:/a:novell:opensuse:salt-syndic, p-cpe:/a:novell:opensuse:salt-zsh-completion, cpe:/o:novell:opensuse:42.3

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Patch Publication Date: 9/7/2017

Reference Information

CVE: CVE-2017-12791

IAVB: 2017-B-0112-S