rpm package
suse/spacewalk-client-tools&distro=SUSE Linux Enterprise Server 11 SP3-CLIENT-TOOLS
pkg:rpm/suse/spacewalk-client-tools&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-CLIENT-TOOLS
Vulnerabilities (6)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2021-21996 | — | < 4.2.14-27.59.1 | 4.2.14-27.59.1 | Sep 8, 2021 | An issue was discovered in SaltStack Salt before 3003.3. A user who has control of the source, and source_hash URLs can gain full file system access as root on a salt minion. | ||
| CVE-2021-31607 | — | < 4.2.10-27.50.1 | 4.2.10-27.50.1 | Apr 23, 2021 | In SaltStack Salt 2016.9 through 3002.6, a command injection vulnerability exists in the snapper module that allows for local privilege escalation on a minion. The attack requires that a file is created with a pathname that is backed up by snapper, and that the master calls the s | ||
| CVE-2020-25592 | — | < 4.1.7-27.38.1 | 4.1.7-27.38.1 | Nov 6, 2020 | In SaltStack Salt through 3002, salt-netapi improperly validates eauth credentials and tokens. A user can bypass authentication and invoke Salt SSH. | ||
| CVE-2020-17490 | — | < 4.1.7-27.38.1 | 4.1.7-27.38.1 | Nov 6, 2020 | The TLS module within SaltStack Salt through 3002 creates certificates with weak file permissions. | ||
| CVE-2020-16846 | — | KEV | < 4.1.7-27.38.1 | 4.1.7-27.38.1 | Nov 6, 2020 | An issue was discovered in SaltStack Salt through 3002. Sending crafted web requests to the Salt API, with the SSH client enabled, can result in shell injection. | |
| CVE-2017-7470 | — | < 2.5.13.8-23.1 | 2.5.13.8-23.1 | Jul 27, 2018 | It was found that spacewalk-channel can be used by a non-admin user or disabled users to perform administrative tasks due to an incorrect authorization check in backend/server/rhnChannel.py. |
- CVE-2021-21996Sep 8, 2021affected < 4.2.14-27.59.1fixed 4.2.14-27.59.1
An issue was discovered in SaltStack Salt before 3003.3. A user who has control of the source, and source_hash URLs can gain full file system access as root on a salt minion.
- CVE-2021-31607Apr 23, 2021affected < 4.2.10-27.50.1fixed 4.2.10-27.50.1
In SaltStack Salt 2016.9 through 3002.6, a command injection vulnerability exists in the snapper module that allows for local privilege escalation on a minion. The attack requires that a file is created with a pathname that is backed up by snapper, and that the master calls the s
- CVE-2020-25592Nov 6, 2020affected < 4.1.7-27.38.1fixed 4.1.7-27.38.1
In SaltStack Salt through 3002, salt-netapi improperly validates eauth credentials and tokens. A user can bypass authentication and invoke Salt SSH.
- CVE-2020-17490Nov 6, 2020affected < 4.1.7-27.38.1fixed 4.1.7-27.38.1
The TLS module within SaltStack Salt through 3002 creates certificates with weak file permissions.
- affected < 4.1.7-27.38.1fixed 4.1.7-27.38.1
An issue was discovered in SaltStack Salt through 3002. Sending crafted web requests to the Salt API, with the SSH client enabled, can result in shell injection.
- CVE-2017-7470Jul 27, 2018affected < 2.5.13.8-23.1fixed 2.5.13.8-23.1
It was found that spacewalk-channel can be used by a non-admin user or disabled users to perform administrative tasks due to an incorrect authorization check in backend/server/rhnChannel.py.