Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
openSUSE:Leap:15.5:Update
patchinfo.9310
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.9310
<patchinfo incident="9310"> <issue tracker="bnc" id="1113698">VUL-0: CVE-2018-15750: salt: directory traversal vulnerability in salt-api</issue> <issue tracker="bnc" id="1113699">VUL-0: CVE-2018-15751: salt: remote authentication bypass in salt-api(netapi) allows to execute arbitrary commands</issue> <issue tracker="bnc" id="1110938">L3: salt-minion WARNING on restart sumautil.py & module.run deprecated version Sodium</issue> <issue tracker="bnc" id="1113784">L3: Test for group and create group fails when running from SUMA, works when run from client</issue> <issue id="1114197" tracker="bnc">null value in column "server_arch_id"</issue> <issue tracker="cve" id="2018-15750"/> <issue tracker="cve" id="2018-15751"/> <category>security</category> <rating>important</rating> <packager>juliogonzalezgil</packager> <description>This update for salt fixes the following issues: Security issues fixed: - CVE-2018-15750: Fixed directory traversal vulnerability in salt-api (bsc#1113698). - CVE-2018-15751: Fixed remote authentication bypass in salt-api(netapi) that allows to execute arbitrary commands (bsc#1113699). Non-security issues fixed: - Improved handling of LDAP group id. gid is no longer treated as a string, which could have lead to faulty group creations (bsc#1113784). - Fixed async call to process manager (bsc#1110938). - Fixed OS arch detection when RPM is not installed (bsc#1114197). </description> <summary>Security update for salt</summary> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor