rpm package
suse/spacewalk-backend&distro=SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS
pkg:rpm/suse/spacewalk-backend&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-CLIENT-TOOLS
Vulnerabilities (3)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2019-10136 | — | < 4.0.25-28.42.1 | 4.0.25-28.42.1 | Jul 2, 2019 | It was found that Spacewalk, all versions through 2.9, did not safely compute client token checksums. An attacker with a valid, but expired, authenticated set of headers could move some digits around, artificially extending the session validity without modifying the checksum. | ||
| CVE-2017-7470 | — | < 2.5.24.9-24.1 | 2.5.24.9-24.1 | Jul 27, 2018 | It was found that spacewalk-channel can be used by a non-admin user or disabled users to perform administrative tasks due to an incorrect authorization check in backend/server/rhnChannel.py. | ||
| CVE-2016-9639 | Cri | 9.1 | < 2.5.24.7-16.1 | 2.5.24.7-16.1 | Feb 7, 2017 | Salt before 2015.8.11 allows deleted minions to read or write to minions with the same id, related to caching. |
- CVE-2019-10136Jul 2, 2019affected < 4.0.25-28.42.1fixed 4.0.25-28.42.1
It was found that Spacewalk, all versions through 2.9, did not safely compute client token checksums. An attacker with a valid, but expired, authenticated set of headers could move some digits around, artificially extending the session validity without modifying the checksum.
- CVE-2017-7470Jul 27, 2018affected < 2.5.24.9-24.1fixed 2.5.24.9-24.1
It was found that spacewalk-channel can be used by a non-admin user or disabled users to perform administrative tasks due to an incorrect authorization check in backend/server/rhnChannel.py.
- affected < 2.5.24.7-16.1fixed 2.5.24.7-16.1
Salt before 2015.8.11 allows deleted minions to read or write to minions with the same id, related to caching.