<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security Beta update for Salt</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2020:0540-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2020-02-28T12:20:13Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2020-02-28T12:20:13Z</InitialReleaseDate>
    <CurrentReleaseDate>2020-02-28T12:20:13Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security Beta update for Salt</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
This update fixes the following issues:

salt:

- Fix 'os_family' grain for Astra Linux Common Edition
- Update to Salt version 2019.2.3 (CVE-2019-17361) (bsc#1163981)
  See release notes: https://docs.saltstack.com/en/latest/topics/releases/2019.2.3.html
- Enable passing grains to start event based on 'start_event_grains' configuration parameter

</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2020-540,SUSE-SLE-Manager-Tools-15-2020-540</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2020/suse-su-20200540-1/</URL>
      <Description>Link for SUSE-SU-2020:0540-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2020-February/006552.html</URL>
      <Description>E-Mail link for SUSE-SU-2020:0540-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1163981</URL>
      <Description>SUSE Bug 1163981</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-17361/</URL>
      <Description>SUSE CVE CVE-2019-17361 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Version" Name="python2-salt-2019.2.3-8.9.1">
      <FullProductName ProductID="python2-salt-2019.2.3-8.9.1">python2-salt-2019.2.3-8.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python3-salt-2019.2.3-8.9.1">
      <FullProductName ProductID="python3-salt-2019.2.3-8.9.1">python3-salt-2019.2.3-8.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="salt-2019.2.3-8.9.1">
      <FullProductName ProductID="salt-2019.2.3-8.9.1">salt-2019.2.3-8.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="salt-api-2019.2.3-8.9.1">
      <FullProductName ProductID="salt-api-2019.2.3-8.9.1">salt-api-2019.2.3-8.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="salt-bash-completion-2019.2.3-8.9.1">
      <FullProductName ProductID="salt-bash-completion-2019.2.3-8.9.1">salt-bash-completion-2019.2.3-8.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="salt-cloud-2019.2.3-8.9.1">
      <FullProductName ProductID="salt-cloud-2019.2.3-8.9.1">salt-cloud-2019.2.3-8.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="salt-doc-2019.2.3-8.9.1">
      <FullProductName ProductID="salt-doc-2019.2.3-8.9.1">salt-doc-2019.2.3-8.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="salt-fish-completion-2019.2.3-8.9.1">
      <FullProductName ProductID="salt-fish-completion-2019.2.3-8.9.1">salt-fish-completion-2019.2.3-8.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="salt-master-2019.2.3-8.9.1">
      <FullProductName ProductID="salt-master-2019.2.3-8.9.1">salt-master-2019.2.3-8.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="salt-minion-2019.2.3-8.9.1">
      <FullProductName ProductID="salt-minion-2019.2.3-8.9.1">salt-minion-2019.2.3-8.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="salt-proxy-2019.2.3-8.9.1">
      <FullProductName ProductID="salt-proxy-2019.2.3-8.9.1">salt-proxy-2019.2.3-8.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="salt-ssh-2019.2.3-8.9.1">
      <FullProductName ProductID="salt-ssh-2019.2.3-8.9.1">salt-ssh-2019.2.3-8.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="salt-standalone-formulas-configuration-2019.2.3-8.9.1">
      <FullProductName ProductID="salt-standalone-formulas-configuration-2019.2.3-8.9.1">salt-standalone-formulas-configuration-2019.2.3-8.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="salt-syndic-2019.2.3-8.9.1">
      <FullProductName ProductID="salt-syndic-2019.2.3-8.9.1">salt-syndic-2019.2.3-8.9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="salt-zsh-completion-2019.2.3-8.9.1">
      <FullProductName ProductID="salt-zsh-completion-2019.2.3-8.9.1">salt-zsh-completion-2019.2.3-8.9.1</FullProductName>
    </Branch>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In SaltStack Salt through 2019.2.0, the salt-api NET API with the ssh client enabled is vulnerable to command injection. This allows an unauthenticated attacker with network access to the API endpoint to execute arbitrary code on the salt-api host.</Note>
    </Notes>
    <CVE>CVE-2019-17361</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2020/suse-su-20200540-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-17361.html</URL>
        <Description>CVE-2019-17361</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1162504</URL>
        <Description>SUSE Bug 1162504</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
