Debian Security Advisory
DLA-2480-2 salt -- LTS security update
- Date Reported:
- 03 Jan 2022
- Affected Packages:
- salt
- Vulnerable:
- Yes
- Security database references:
- In Mitre's CVE dictionary: CVE-2020-16846, CVE-2021-3197, CVE-2020-28243, CVE-2021-25282, CVE-2021-25284.
- More information:
-
Past security updates of Salt, a remote execution manager, introduced regressions for which follow-up fixes were published:
- CVE-2020-16846 regression
salt-ssh
master key initialization fails - CVE-2021-3197 regression
Valid parameters are discarded for the SSHClient
- CVE-2020-28243 follow-up
Prevent argument injection in restartcheck
- CVE-2021-25282 regression
pillar_roots.write cannot write to subdirs
- CVE-2021-25284 regression
The
cmd.run
function crashes if passing tuple arg
For Debian 9 stretch, this problem has been fixed in version 2016.11.2+ds-1+deb9u10.
We recommend that you upgrade your salt packages.
For the detailed security status of salt please refer to its security tracker page at: https://security-tracker.debian.org/tracker/salt
Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS
- CVE-2020-16846 regression