------------------------------------------------------------------------- Debian LTS Advisory DLA-2815-1 debian-lts@lists.debian.org https://www.debian.org/lts/security/ Markus Koschany November 10, 2021 https://wiki.debian.org/LTS ------------------------------------------------------------------------- Package : salt Version : 2016.11.2+ds-1+deb9u7 CVE ID : CVE-2020-28243 CVE-2020-28972 CVE-2020-35662 CVE-2021-3144 CVE-2021-3148 CVE-2021-3197 CVE-2021-25281 CVE-2021-25282 CVE-2021-25283 CVE-2021-25284 CVE-2021-31607 Debian Bug : 987496 987496 Multiple security vulnerabilities have been discovered in Salt, a powerful remote execution manager, that allow for local privilege escalation on a minion, server side template injection attacks, insufficient checks for eauth credentials, shell and command injections or incorrect validation of SSL certificates. For Debian 9 stretch, these problems have been fixed in version 2016.11.2+ds-1+deb9u7. We recommend that you upgrade your salt packages. For the detailed security status of salt please refer to its security tracker page at: https://security-tracker.debian.org/tracker/salt Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS
Attachment:
signature.asc
Description: This is a digitally signed message part