[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 2480-2] salt regression update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian LTS Advisory DLA-2480-2                debian-lts@lists.debian.org
https://www.debian.org/lts/security/                      Sylvain Beucler
January 03, 2022                              https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package        : salt
Version        : 2016.11.2+ds-1+deb9u10
CVE ID         : CVE-2020-16846 CVE-2021-3197 CVE-2020-28243
                 CVE-2021-25282 CVE-2021-25284

Past security updates of Salt, a remote execution manager, introduced
regressions for which follow-up fixes were published:

CVE 2020-16846 regression

    'salt-ssh' master key initialization fails

CVE 2021-3197 regression

    Valid parameters are discarded for the SSHClient

CVE 2020-28243 follow-up

    Prevent argument injection in restartcheck

CVE 2021-25282 regression

    pillar_roots.write cannot write to subdirs

CVE 2021-25284 regression

    The 'cmd.run' function crashes if passing tuple arg

For Debian 9 stretch, this problem has been fixed in version
2016.11.2+ds-1+deb9u10.

We recommend that you upgrade your salt packages.

For the detailed security status of salt please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/salt

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-----BEGIN PGP SIGNATURE-----
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=roI6
-----END PGP SIGNATURE-----


Reply to: