ALT-BU-2016-3162-1
Branch c7 update bulletin.
Closed bugs
не запускается после обновления
Package kernel-image-un-def updated to version 4.4.34-alt0.M70C.2 for branch c7 in task 172578.
Closed vulnerabilities
BDU:2017-01280
Уязвимость функции sctp_sf_ootb ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие
Modified: 2024-11-21
CVE-2015-8964
The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel before 4.5 allows local users to obtain sensitive information from kernel memory by reading a tty data structure.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=dd42bf1197144ede075a9d4793123f7689e164bc
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=dd42bf1197144ede075a9d4793123f7689e164bc
- http://source.android.com/security/bulletin/2016-11-01.html
- http://source.android.com/security/bulletin/2016-11-01.html
- 94138
- 94138
- https://github.com/torvalds/linux/commit/dd42bf1197144ede075a9d4793123f7689e164bc
- https://github.com/torvalds/linux/commit/dd42bf1197144ede075a9d4793123f7689e164bc
Modified: 2024-11-21
CVE-2016-7039
The IP stack in the Linux kernel through 4.8.2 allows remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for large crafted packets, as demonstrated by packets that contain only VLAN headers, a related issue to CVE-2016-8666.
- RHSA-2016:2047
- RHSA-2016:2047
- RHSA-2016:2107
- RHSA-2016:2107
- RHSA-2016:2110
- RHSA-2016:2110
- [oss-security] 20161010 CVE-2016-7039 Kernel: net: unbounded recursion in the vlan GRO processing
- [oss-security] 20161010 CVE-2016-7039 Kernel: net: unbounded recursion in the vlan GRO processing
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
- 93476
- 93476
- RHSA-2017:0372
- RHSA-2017:0372
- https://bto.bluecoat.com/security-advisory/sa134
- https://bto.bluecoat.com/security-advisory/sa134
- https://bugzilla.redhat.com/show_bug.cgi?id=1375944
- https://bugzilla.redhat.com/show_bug.cgi?id=1375944
- https://patchwork.ozlabs.org/patch/680412/
- https://patchwork.ozlabs.org/patch/680412/
Modified: 2024-11-21
CVE-2016-7917
The nfnetlink_rcv_batch function in net/netfilter/nfnetlink.c in the Linux kernel before 4.5 does not check whether a batch message's length field is large enough, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (infinite loop or out-of-bounds read) by leveraging the CAP_NET_ADMIN capability.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c58d6c93680f28ac58984af61d0a7ebf4319c241
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c58d6c93680f28ac58984af61d0a7ebf4319c241
- http://source.android.com/security/bulletin/2016-11-01.html
- http://source.android.com/security/bulletin/2016-11-01.html
- 94147
- 94147
- https://github.com/torvalds/linux/commit/c58d6c93680f28ac58984af61d0a7ebf4319c241
- https://github.com/torvalds/linux/commit/c58d6c93680f28ac58984af61d0a7ebf4319c241
Modified: 2024-11-21
CVE-2016-9555
The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=bf911e985d6bbaa328c20c3e05f4eb03de11fdd6
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=bf911e985d6bbaa328c20c3e05f4eb03de11fdd6
- SUSE-SU-2016:3096
- SUSE-SU-2016:3096
- SUSE-SU-2016:3113
- SUSE-SU-2016:3113
- SUSE-SU-2016:3116
- SUSE-SU-2016:3116
- SUSE-SU-2016:3117
- SUSE-SU-2016:3117
- SUSE-SU-2016:3169
- SUSE-SU-2016:3169
- SUSE-SU-2016:3183
- SUSE-SU-2016:3183
- SUSE-SU-2016:3197
- SUSE-SU-2016:3197
- SUSE-SU-2016:3205
- SUSE-SU-2016:3205
- SUSE-SU-2016:3206
- SUSE-SU-2016:3206
- SUSE-SU-2016:3247
- SUSE-SU-2016:3247
- RHSA-2017:0086
- RHSA-2017:0086
- RHSA-2017:0091
- RHSA-2017:0091
- RHSA-2017:0113
- RHSA-2017:0113
- RHSA-2017:0307
- RHSA-2017:0307
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.8
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.8
- [oss-security] 20161122 CVE Request: Linux: net/sctp: slab-out-of-bounds in sctp_sf_ootb
- [oss-security] 20161122 CVE Request: Linux: net/sctp: slab-out-of-bounds in sctp_sf_ootb
- 94479
- 94479
- 1037339
- 1037339
- https://bto.bluecoat.com/security-advisory/sa134
- https://bto.bluecoat.com/security-advisory/sa134
- https://bugzilla.redhat.com/show_bug.cgi?id=1397930
- https://bugzilla.redhat.com/show_bug.cgi?id=1397930
- https://github.com/torvalds/linux/commit/bf911e985d6bbaa328c20c3e05f4eb03de11fdd6
- https://github.com/torvalds/linux/commit/bf911e985d6bbaa328c20c3e05f4eb03de11fdd6
- https://groups.google.com/forum/#%21topic/syzkaller/pAUcHsUJbjk
- https://groups.google.com/forum/#%21topic/syzkaller/pAUcHsUJbjk
Closed vulnerabilities
BDU:2020-02957
Уязвимость модуля modules/serverdensity_device.py системы управления конфигураций и удаленного выполнения операций SaltStack, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным, вызвать отказ в обслуживании или оказать воздействие на целостность данных
BDU:2021-01180
Уязвимость системы управления конфигурациями и удалённого выполнения операций SaltStack Salt, связанная с ошибками процедуры подтверждения подлинности сертификата, позволяющая нарушителю выполнить атаку типа «человек посередине»
BDU:2021-01900
Уязвимость компонента salt-netapi системы управления конфигурациями и удалённого выполнения операций Salt, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-01902
Уязвимость модуля TLS системы управления конфигурациями и удалённого выполнения операций Salt, связанная с неправильным присвоением разрешений для критичного ресурса, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2021-01903
Уязвимость системы управления конфигурациями и удалённого выполнения операций Salt, связанная с отсутствием мер по нейтрализации специальных элементов, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-05977
Уязвимость системы управления конфигурациями и удалённого выполнения операций SaltStack Salt, связанная с неправильным ограничением доступа, позволяющая нарушителю получить несанкционированный доступ к другим ограниченным функциям
BDU:2021-06340
Уязвимость функции salt.utils.thin.gen_thin() системы управления конфигурациями и удалённого выполнения операций SaltStack Salt, позволяющая нарушителю выполнять произвольные команды в целевой системе
BDU:2021-06341
Уязвимость системы управления конфигурациями и удалённого выполнения операций SaltStack Salt, позволяющая нарушителю локально повысить привилегии.
BDU:2021-06345
Уязвимость системы управления конфигурациями и удалённого выполнения операций SaltStack Salt, позволяющая нарушителю выполнять произвольные команды с повышенными привилегиями
BDU:2021-06348
Уязвимость компонента wheel.pillar_roots.write системы управления конфигурациями и удалённого выполнения операций SaltStack Salt, связанная с ошибками при проверке вводимых данных, позволяющая нарушителю выполнить произвольный код
BDU:2022-00038
Уязвимость системы управления конфигурациями и удалённого выполнения операций SaltStack Salt, связанная с ошибками при обработке запросов аутентификации для истекших токенов eauth, позволяющая нарушителю выполнить произвольные команды
BDU:2022-07041
Уязвимость системы управления конфигурациями и удалённого выполнения операций SaltStack Salt, связанная с ошибками процедуры подтверждения подлинности сертификата, позволяющая нарушителю выполнить атаку типа «человек посередине»
BDU:2022-07060
Уязвимость реализации метода salt.wheel.pillar_roots.write системы управления конфигурациями и удалённого выполнения операций SaltStack Salt, позволяющая нарушителю раскрыть защищаемую информацию
Modified: 2024-11-21
CVE-2013-4438
Salt (aka SaltStack) before 0.17.1 allows remote attackers to execute arbitrary YAML code via unspecified vectors. NOTE: the vendor states that this might not be a vulnerability because the YAML to be loaded has already been determined to be safe.
Modified: 2024-11-21
CVE-2014-3563
Multiple unspecified vulnerabilities in Salt (aka SaltStack) before 2014.1.10 allow local users to have an unspecified impact via vectors related to temporary file creation in (1) seed.py, (2) salt-ssh, or (3) salt-cloud.
- http://docs.saltstack.com/en/latest/topics/releases/2014.1.10.html
- http://docs.saltstack.com/en/latest/topics/releases/2014.1.10.html
- [oss-security] 20140821 Revised: Salt 2014.1.10 released
- [oss-security] 20140821 Revised: Salt 2014.1.10 released
- 69319
- 69319
- salt-cve20143563-symlink(95392)
- salt-cve20143563-symlink(95392)
Modified: 2024-11-21
CVE-2015-1838
modules/serverdensity_device.py in SaltStack before 2014.7.4 does not properly handle files in /tmp.
- FEDORA-2016-105b3b8804
- FEDORA-2016-105b3b8804
- https://bugzilla.redhat.com/show_bug.cgi?id=1212784
- https://bugzilla.redhat.com/show_bug.cgi?id=1212784
- https://docs.saltstack.com/en/latest/topics/releases/2014.7.4.html
- https://docs.saltstack.com/en/latest/topics/releases/2014.7.4.html
- https://github.com/saltstack/salt/commit/e11298d7155e9982749483ca5538e46090caef9c
- https://github.com/saltstack/salt/commit/e11298d7155e9982749483ca5538e46090caef9c
Modified: 2024-11-21
CVE-2015-1839
modules/chef.py in SaltStack before 2014.7.4 does not properly handle files in /tmp.
- FEDORA-2016-105b3b8804
- FEDORA-2016-105b3b8804
- https://bugzilla.redhat.com/show_bug.cgi?id=1212788
- https://bugzilla.redhat.com/show_bug.cgi?id=1212788
- https://docs.saltstack.com/en/latest/topics/releases/2014.7.4.html
- https://docs.saltstack.com/en/latest/topics/releases/2014.7.4.html
- https://github.com/saltstack/salt/commit/22d2f7a1ec93300c34e8c42d14ec39d51e610b5c
- https://github.com/saltstack/salt/commit/22d2f7a1ec93300c34e8c42d14ec39d51e610b5c
- https://github.com/saltstack/salt/commit/b49d0d4b5ca5c6f31f03e2caf97cef1088eeed81
- https://github.com/saltstack/salt/commit/b49d0d4b5ca5c6f31f03e2caf97cef1088eeed81
Modified: 2024-11-21
CVE-2015-8034
The state.sls function in Salt before 2015.8.3 uses weak permissions on the cache data, which allows local users to obtain sensitive information by reading the file.
Modified: 2024-11-21
CVE-2016-3176
Salt before 2015.5.10 and 2015.8.x before 2015.8.8, when PAM external authentication is enabled, allows attackers to bypass the configured authentication service by passing an alternate service with a command sent to LocalClient.
Modified: 2024-11-21
CVE-2016-9639
Salt before 2015.8.11 allows deleted minions to read or write to minions with the same id, related to caching.
- [oss-security] 20161125 CVE Request: salt confidentiality issue
- [oss-security] 20161125 CVE Request: salt confidentiality issue
- [oss-security] 20161125 Re: CVE Request: salt confidentiality issue
- [oss-security] 20161125 Re: CVE Request: salt confidentiality issue
- 94553
- 94553
- https://docs.saltstack.com/en/2015.8/ref/configuration/master.html#rotate-aes-key
- https://docs.saltstack.com/en/2015.8/ref/configuration/master.html#rotate-aes-key
Modified: 2025-03-14
CVE-2020-16846
An issue was discovered in SaltStack Salt through 3002. Sending crafted web requests to the Salt API, with the SSH client enabled, can result in shell injection.
- openSUSE-SU-2020:1868
- openSUSE-SU-2020:1868
- http://packetstormsecurity.com/files/160039/SaltStack-Salt-REST-API-Arbitrary-Command-Execution.html
- http://packetstormsecurity.com/files/160039/SaltStack-Salt-REST-API-Arbitrary-Command-Execution.html
- https://github.com/saltstack/salt/releases
- https://github.com/saltstack/salt/releases
- [debian-lts-announce] 20201204 [SECURITY] [DLA 2480-1] salt security update
- [debian-lts-announce] 20201204 [SECURITY] [DLA 2480-1] salt security update
- [debian-lts-announce] 20220103 [SECURITY] [DLA 2480-2] salt regression update
- [debian-lts-announce] 20220103 [SECURITY] [DLA 2480-2] salt regression update
- FEDORA-2020-9e040bd6dd
- FEDORA-2020-9e040bd6dd
- GLSA-202011-13
- GLSA-202011-13
- DSA-4837
- DSA-4837
- https://www.saltstack.com/blog/on-november-3-2020-saltstack-publicly-disclosed-three-new-cves/
- https://www.saltstack.com/blog/on-november-3-2020-saltstack-publicly-disclosed-three-new-cves/
- https://www.zerodayinitiative.com/advisories/ZDI-20-1379/
- https://www.zerodayinitiative.com/advisories/ZDI-20-1379/
- https://www.zerodayinitiative.com/advisories/ZDI-20-1380/
- https://www.zerodayinitiative.com/advisories/ZDI-20-1380/
- https://www.zerodayinitiative.com/advisories/ZDI-20-1381/
- https://www.zerodayinitiative.com/advisories/ZDI-20-1381/
- https://www.zerodayinitiative.com/advisories/ZDI-20-1382/
- https://www.zerodayinitiative.com/advisories/ZDI-20-1382/
- https://www.zerodayinitiative.com/advisories/ZDI-20-1383/
- https://www.zerodayinitiative.com/advisories/ZDI-20-1383/
Modified: 2024-11-21
CVE-2020-17490
The TLS module within SaltStack Salt through 3002 creates certificates with weak file permissions.
- openSUSE-SU-2020:1868
- openSUSE-SU-2020:1868
- https://docs.saltstack.com/en/latest/topics/releases/index.html#latest-branch-release
- https://docs.saltstack.com/en/latest/topics/releases/index.html#latest-branch-release
- [debian-lts-announce] 20201204 [SECURITY] [DLA 2480-1] salt security update
- [debian-lts-announce] 20201204 [SECURITY] [DLA 2480-1] salt security update
- FEDORA-2020-9e040bd6dd
- FEDORA-2020-9e040bd6dd
- GLSA-202011-13
- GLSA-202011-13
- DSA-4837
- DSA-4837
- https://www.saltstack.com/blog/on-november-3-2020-saltstack-publicly-disclosed-three-new-cves/
- https://www.saltstack.com/blog/on-november-3-2020-saltstack-publicly-disclosed-three-new-cves/
Modified: 2024-11-21
CVE-2020-25592
In SaltStack Salt through 3002, salt-netapi improperly validates eauth credentials and tokens. A user can bypass authentication and invoke Salt SSH.
- openSUSE-SU-2020:1868
- openSUSE-SU-2020:1868
- http://packetstormsecurity.com/files/160039/SaltStack-Salt-REST-API-Arbitrary-Command-Execution.html
- http://packetstormsecurity.com/files/160039/SaltStack-Salt-REST-API-Arbitrary-Command-Execution.html
- https://docs.saltstack.com/en/latest/topics/releases/index.html
- https://docs.saltstack.com/en/latest/topics/releases/index.html
- [debian-lts-announce] 20201204 [SECURITY] [DLA 2480-1] salt security update
- [debian-lts-announce] 20201204 [SECURITY] [DLA 2480-1] salt security update
- FEDORA-2020-9e040bd6dd
- FEDORA-2020-9e040bd6dd
- GLSA-202011-13
- GLSA-202011-13
- DSA-4837
- DSA-4837
- https://www.saltstack.com/blog/on-november-3-2020-saltstack-publicly-disclosed-three-new-cves/
- https://www.saltstack.com/blog/on-november-3-2020-saltstack-publicly-disclosed-three-new-cves/
Modified: 2024-11-21
CVE-2020-28243
An issue was discovered in SaltStack Salt before 3002.5. The minion's restartcheck is vulnerable to command injection via a crafted process name. This allows for a local privilege escalation by any user able to create a files on the minion in a non-blacklisted directory.
- https://github.com/stealthcopter/CVE-2020-28243
- https://github.com/stealthcopter/CVE-2020-28243
- [debian-lts-announce] 20211110 [SECURITY] [DLA 2815-1] salt security update
- [debian-lts-announce] 20211110 [SECURITY] [DLA 2815-1] salt security update
- [debian-lts-announce] 20220103 [SECURITY] [DLA 2480-2] salt regression update
- [debian-lts-announce] 20220103 [SECURITY] [DLA 2480-2] salt regression update
- FEDORA-2021-5756fbf8a6
- FEDORA-2021-5756fbf8a6
- FEDORA-2021-43eb5584ad
- FEDORA-2021-43eb5584ad
- FEDORA-2021-904a2dbc0c
- FEDORA-2021-904a2dbc0c
- https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/
- https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/
- https://sec.stealthcopter.com/cve-2020-28243/
- https://sec.stealthcopter.com/cve-2020-28243/
- GLSA-202103-01
- GLSA-202103-01
- GLSA-202310-22
- GLSA-202310-22
- DSA-5011
- DSA-5011
Modified: 2024-11-21
CVE-2020-28972
In SaltStack Salt before 3002.5, authentication to VMware vcenter, vsphere, and esxi servers (in the vmware.py files) does not always validate the SSL/TLS certificate.
- [debian-lts-announce] 20211110 [SECURITY] [DLA 2815-1] salt security update
- [debian-lts-announce] 20211110 [SECURITY] [DLA 2815-1] salt security update
- FEDORA-2021-5756fbf8a6
- FEDORA-2021-5756fbf8a6
- FEDORA-2021-43eb5584ad
- FEDORA-2021-43eb5584ad
- FEDORA-2021-904a2dbc0c
- FEDORA-2021-904a2dbc0c
- https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/
- https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/
- GLSA-202103-01
- GLSA-202103-01
- GLSA-202310-22
- GLSA-202310-22
- DSA-5011
- DSA-5011
Modified: 2024-11-21
CVE-2020-35662
In SaltStack Salt before 3002.5, when authenticating to services using certain modules, the SSL certificate is not always validated.
- [debian-lts-announce] 20211110 [SECURITY] [DLA 2815-1] salt security update
- [debian-lts-announce] 20211110 [SECURITY] [DLA 2815-1] salt security update
- FEDORA-2021-5756fbf8a6
- FEDORA-2021-5756fbf8a6
- FEDORA-2021-43eb5584ad
- FEDORA-2021-43eb5584ad
- FEDORA-2021-904a2dbc0c
- FEDORA-2021-904a2dbc0c
- https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/
- https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/
- GLSA-202103-01
- GLSA-202103-01
- GLSA-202310-22
- GLSA-202310-22
- DSA-5011
- DSA-5011
Modified: 2024-11-21
CVE-2021-25281
An issue was discovered in through SaltStack Salt before 3002.5. salt-api does not honor eauth credentials for the wheel_async client. Thus, an attacker can remotely run any wheel modules on the master.
- http://packetstormsecurity.com/files/162058/SaltStack-Salt-API-Unauthenticated-Remote-Command-Execution.html
- http://packetstormsecurity.com/files/162058/SaltStack-Salt-API-Unauthenticated-Remote-Command-Execution.html
- https://github.com/saltstack/salt/releases
- https://github.com/saltstack/salt/releases
- [debian-lts-announce] 20211110 [SECURITY] [DLA 2815-1] salt security update
- [debian-lts-announce] 20211110 [SECURITY] [DLA 2815-1] salt security update
- FEDORA-2021-5756fbf8a6
- FEDORA-2021-5756fbf8a6
- FEDORA-2021-43eb5584ad
- FEDORA-2021-43eb5584ad
- FEDORA-2021-904a2dbc0c
- FEDORA-2021-904a2dbc0c
- https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/
- https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/
- GLSA-202103-01
- GLSA-202103-01
- GLSA-202310-22
- GLSA-202310-22
- DSA-5011
- DSA-5011
- https://www.saltstack.com/blog/active-saltstack-cve-announced-2021-jan-21/
- https://www.saltstack.com/blog/active-saltstack-cve-announced-2021-jan-21/
Modified: 2024-11-21
CVE-2021-25282
An issue was discovered in through SaltStack Salt before 3002.5. The salt.wheel.pillar_roots.write method is vulnerable to directory traversal.
- http://packetstormsecurity.com/files/162058/SaltStack-Salt-API-Unauthenticated-Remote-Command-Execution.html
- http://packetstormsecurity.com/files/162058/SaltStack-Salt-API-Unauthenticated-Remote-Command-Execution.html
- https://github.com/saltstack/salt/releases
- https://github.com/saltstack/salt/releases
- [debian-lts-announce] 20211110 [SECURITY] [DLA 2815-1] salt security update
- [debian-lts-announce] 20211110 [SECURITY] [DLA 2815-1] salt security update
- [debian-lts-announce] 20220103 [SECURITY] [DLA 2480-2] salt regression update
- [debian-lts-announce] 20220103 [SECURITY] [DLA 2480-2] salt regression update
- FEDORA-2021-5756fbf8a6
- FEDORA-2021-5756fbf8a6
- FEDORA-2021-43eb5584ad
- FEDORA-2021-43eb5584ad
- FEDORA-2021-904a2dbc0c
- FEDORA-2021-904a2dbc0c
- https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/
- https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/
- GLSA-202103-01
- GLSA-202103-01
- GLSA-202310-22
- GLSA-202310-22
- DSA-5011
- DSA-5011
Modified: 2024-11-21
CVE-2021-25283
An issue was discovered in through SaltStack Salt before 3002.5. The jinja renderer does not protect against server side template injection attacks.
- https://github.com/saltstack/salt/releases
- https://github.com/saltstack/salt/releases
- [debian-lts-announce] 20211110 [SECURITY] [DLA 2815-1] salt security update
- [debian-lts-announce] 20211110 [SECURITY] [DLA 2815-1] salt security update
- FEDORA-2021-5756fbf8a6
- FEDORA-2021-5756fbf8a6
- FEDORA-2021-43eb5584ad
- FEDORA-2021-43eb5584ad
- FEDORA-2021-904a2dbc0c
- FEDORA-2021-904a2dbc0c
- https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/
- https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/
- GLSA-202103-01
- GLSA-202103-01
- GLSA-202310-22
- GLSA-202310-22
- DSA-5011
- DSA-5011
Modified: 2024-11-21
CVE-2021-25284
An issue was discovered in through SaltStack Salt before 3002.5. salt.modules.cmdmod can log credentials to the info or error log level.
- https://github.com/saltstack/salt/releases
- https://github.com/saltstack/salt/releases
- [debian-lts-announce] 20211110 [SECURITY] [DLA 2815-1] salt security update
- [debian-lts-announce] 20211110 [SECURITY] [DLA 2815-1] salt security update
- [debian-lts-announce] 20220103 [SECURITY] [DLA 2480-2] salt regression update
- [debian-lts-announce] 20220103 [SECURITY] [DLA 2480-2] salt regression update
- FEDORA-2021-5756fbf8a6
- FEDORA-2021-5756fbf8a6
- FEDORA-2021-43eb5584ad
- FEDORA-2021-43eb5584ad
- FEDORA-2021-904a2dbc0c
- FEDORA-2021-904a2dbc0c
- https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/
- https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/
- GLSA-202103-01
- GLSA-202103-01
- GLSA-202310-22
- GLSA-202310-22
- DSA-5011
- DSA-5011
Modified: 2024-11-21
CVE-2021-3144
In SaltStack Salt before 3002.5, eauth tokens can be used once after expiration. (They might be used to run command against the salt master or minions.)
- https://github.com/saltstack/salt/releases
- https://github.com/saltstack/salt/releases
- [debian-lts-announce] 20211110 [SECURITY] [DLA 2815-1] salt security update
- [debian-lts-announce] 20211110 [SECURITY] [DLA 2815-1] salt security update
- FEDORA-2021-5756fbf8a6
- FEDORA-2021-5756fbf8a6
- FEDORA-2021-43eb5584ad
- FEDORA-2021-43eb5584ad
- FEDORA-2021-904a2dbc0c
- FEDORA-2021-904a2dbc0c
- https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/
- https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/
- GLSA-202103-01
- GLSA-202103-01
- GLSA-202310-22
- GLSA-202310-22
- DSA-5011
- DSA-5011
Modified: 2024-11-21
CVE-2021-3148
An issue was discovered in SaltStack Salt before 3002.5. Sending crafted web requests to the Salt API can result in salt.utils.thin.gen_thin() command injection because of different handling of single versus double quotes. This is related to salt/utils/thin.py.
- https://github.com/saltstack/salt/releases
- https://github.com/saltstack/salt/releases
- [debian-lts-announce] 20211110 [SECURITY] [DLA 2815-1] salt security update
- [debian-lts-announce] 20211110 [SECURITY] [DLA 2815-1] salt security update
- FEDORA-2021-5756fbf8a6
- FEDORA-2021-5756fbf8a6
- FEDORA-2021-43eb5584ad
- FEDORA-2021-43eb5584ad
- FEDORA-2021-904a2dbc0c
- FEDORA-2021-904a2dbc0c
- https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/
- https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/
- GLSA-202103-01
- GLSA-202103-01
- GLSA-202310-22
- GLSA-202310-22
- DSA-5011
- DSA-5011
Modified: 2024-11-21
CVE-2021-3197
An issue was discovered in SaltStack Salt before 3002.5. The salt-api's ssh client is vulnerable to a shell injection by including ProxyCommand in an argument, or via ssh_options provided in an API request.
- https://github.com/saltstack/salt/releases
- https://github.com/saltstack/salt/releases
- [debian-lts-announce] 20211110 [SECURITY] [DLA 2815-1] salt security update
- [debian-lts-announce] 20211110 [SECURITY] [DLA 2815-1] salt security update
- [debian-lts-announce] 20220103 [SECURITY] [DLA 2480-2] salt regression update
- [debian-lts-announce] 20220103 [SECURITY] [DLA 2480-2] salt regression update
- FEDORA-2021-5756fbf8a6
- FEDORA-2021-5756fbf8a6
- FEDORA-2021-43eb5584ad
- FEDORA-2021-43eb5584ad
- FEDORA-2021-904a2dbc0c
- FEDORA-2021-904a2dbc0c
- https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/
- https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/
- GLSA-202103-01
- GLSA-202103-01
- GLSA-202310-22
- GLSA-202310-22
- DSA-5011
- DSA-5011
Closed bugs
Остался старый код после мерджинга изменений upstream
Обновить версию