Debian Security Advisory

DLA-2480-2 salt -- LTS security update

Date Reported:
03 Jan 2022
Affected Packages:
salt
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2020-16846, CVE-2021-3197, CVE-2020-28243, CVE-2021-25282, CVE-2021-25284.
More information:

Past security updates of Salt, a remote execution manager, introduced regressions for which follow-up fixes were published:

  • CVE-2020-16846 regression

    salt-ssh master key initialization fails

  • CVE-2021-3197 regression

    Valid parameters are discarded for the SSHClient

  • CVE-2020-28243 follow-up

    Prevent argument injection in restartcheck

  • CVE-2021-25282 regression

    pillar_roots.write cannot write to subdirs

  • CVE-2021-25284 regression

    The cmd.run function crashes if passing tuple arg

For Debian 9 stretch, this problem has been fixed in version 2016.11.2+ds-1+deb9u10.

We recommend that you upgrade your salt packages.

For the detailed security status of salt please refer to its security tracker page at: https://security-tracker.debian.org/tracker/salt

Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS