openSUSE Security Update : salt (openSUSE-2021-347)

critical Nessus Plugin ID 146897

Language:

Synopsis

The remote openSUSE host is missing a security update.

Description

This update for salt fixes the following issues :

- Fix regression on cmd.run when passing tuples as cmd (bsc#1182740)

- Allow `extra_filerefs` as sanitized `kwargs` for SSH client

- Fix errors with virt.update

- Fix for multiple for security issues (CVE-2020-28243) (CVE-2020-28972) (CVE-2020-35662) (CVE-2021-3148) (CVE-2021-3144) (CVE-2021-25281) (CVE-2021-25282) (CVE-2021-25283) (CVE-2021-25284) (CVE-2021-3197) (bsc#1181550) (bsc#1181556) (bsc#1181557) (bsc#1181558) (bsc#1181559) (bsc#1181560) (bsc#1181561) (bsc#1181562) (bsc#1181563) (bsc#1181564) (bsc#1181565)

- virt: search for `grub.xen` path

- Xen spicevmc, DNS SRV records backports :

- Fix virtual network generated DNS XML for SRV records

- Don't add spicevmc channel to xen VMs

- virt UEFI fix: virt.update when `efi=True`

This update was imported from the SUSE:SLE-15-SP2:Update update project.

Solution

Update the affected salt packages.

See Also

https://bugzilla.opensuse.org/show_bug.cgi?id=1181550

https://bugzilla.opensuse.org/show_bug.cgi?id=1181556

https://bugzilla.opensuse.org/show_bug.cgi?id=1181557

https://bugzilla.opensuse.org/show_bug.cgi?id=1181558

https://bugzilla.opensuse.org/show_bug.cgi?id=1181559

https://bugzilla.opensuse.org/show_bug.cgi?id=1181560

https://bugzilla.opensuse.org/show_bug.cgi?id=1181561

https://bugzilla.opensuse.org/show_bug.cgi?id=1181562

https://bugzilla.opensuse.org/show_bug.cgi?id=1181563

https://bugzilla.opensuse.org/show_bug.cgi?id=1181564

https://bugzilla.opensuse.org/show_bug.cgi?id=1181565

https://bugzilla.opensuse.org/show_bug.cgi?id=1182740

Plugin Details

Severity: Critical

ID: 146897

File Name: openSUSE-2021-347.nasl

Version: 1.8

Type: local

Agent: unix

Published: 3/1/2021

Updated: 11/9/2021

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.7

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.2

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2021-3197

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 9.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:salt-minion, p-cpe:/a:novell:opensuse:salt-syndic, p-cpe:/a:novell:opensuse:salt-cloud, p-cpe:/a:novell:opensuse:salt-fish-completion, p-cpe:/a:novell:opensuse:salt-ssh, cpe:/o:novell:opensuse:15.2, p-cpe:/a:novell:opensuse:salt-zsh-completion, p-cpe:/a:novell:opensuse:python2-salt, p-cpe:/a:novell:opensuse:python3-salt, p-cpe:/a:novell:opensuse:salt-master, p-cpe:/a:novell:opensuse:salt-bash-completion, p-cpe:/a:novell:opensuse:salt-standalone-formulas-configuration, p-cpe:/a:novell:opensuse:salt, p-cpe:/a:novell:opensuse:salt-proxy, p-cpe:/a:novell:opensuse:salt-api

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2/26/2021

Vulnerability Publication Date: 2/27/2021

Exploitable With

Metasploit (SaltStack Salt API Unauthenticated RCE through wheel_async client)

Reference Information

CVE: CVE-2020-28243, CVE-2020-28972, CVE-2020-35662, CVE-2021-25281, CVE-2021-25282, CVE-2021-25283, CVE-2021-25284, CVE-2021-3144, CVE-2021-3148, CVE-2021-3197

IAVA: 2021-A-0112-S