VYPR

rpm package

suse/spacecmd&distro=SUSE Linux Enterprise Server 11 SP4-CLIENT-TOOLS

pkg:rpm/suse/spacecmd&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-CLIENT-TOOLS

Vulnerabilities (7)

  • CVE-2021-21996Sep 8, 2021
    affected < 4.2.13-18.93.1fixed 4.2.13-18.93.1

    An issue was discovered in SaltStack Salt before 3003.3. A user who has control of the source, and source_hash URLs can gain full file system access as root on a salt minion.

  • CVE-2021-31607Apr 23, 2021
    affected < 4.2.8-18.84.1fixed 4.2.8-18.84.1

    In SaltStack Salt 2016.9 through 3002.6, a command injection vulnerability exists in the snapper module that allows for local privilege escalation on a minion. The attack requires that a file is created with a pathname that is backed up by snapper, and that the master calls the s

  • CVE-2020-25592Nov 6, 2020
    affected < 4.1.8-18.72.1fixed 4.1.8-18.72.1

    In SaltStack Salt through 3002, salt-netapi improperly validates eauth credentials and tokens. A user can bypass authentication and invoke Salt SSH.

  • CVE-2020-17490Nov 6, 2020
    affected < 4.1.8-18.72.1fixed 4.1.8-18.72.1

    The TLS module within SaltStack Salt through 3002 creates certificates with weak file permissions.

  • CVE-2020-16846KEVNov 6, 2020
    affected < 4.1.8-18.72.1fixed 4.1.8-18.72.1

    An issue was discovered in SaltStack Salt through 3002. Sending crafted web requests to the Salt API, with the SSH client enabled, can result in shell injection.

  • CVE-2019-10136Jul 2, 2019
    affected < 4.0.14-18.51.1fixed 4.0.14-18.51.1

    It was found that Spacewalk, all versions through 2.9, did not safely compute client token checksums. An attacker with a valid, but expired, authenticated set of headers could move some digits around, artificially extending the session validity without modifying the checksum.

  • CVE-2017-7470Jul 27, 2018
    affected < 2.5.5.5-14.1fixed 2.5.5.5-14.1

    It was found that spacewalk-channel can be used by a non-admin user or disabled users to perform administrative tasks due to an incorrect authorization check in backend/server/rhnChannel.py.