Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2021:3556-1

Опубликовано: 27 окт. 2021
Источник: suse-cvrf

Описание

Security update for salt

This update for salt fixes the following issues:

  • Support querying for JSON data in external sql pillar.
  • Exclude the full path of a download URL to prevent injection of malicious code. (bsc#1190265, CVE-2021-21996)

Список пакетов

Image SLES15-SP2-BYOS-Azure
python3-salt-3002.2-49.2
salt-3002.2-49.2
salt-minion-3002.2-49.2
Image SLES15-SP2-BYOS-EC2-HVM
python3-salt-3002.2-49.2
salt-3002.2-49.2
salt-minion-3002.2-49.2
Image SLES15-SP2-BYOS-GCE
python3-salt-3002.2-49.2
salt-3002.2-49.2
salt-minion-3002.2-49.2
Image SLES15-SP2-HPC-BYOS-Azure
python3-salt-3002.2-49.2
salt-3002.2-49.2
salt-minion-3002.2-49.2
Image SLES15-SP2-HPC-BYOS-EC2-HVM
python3-salt-3002.2-49.2
salt-3002.2-49.2
salt-minion-3002.2-49.2
Image SLES15-SP2-Manager-4-1-Proxy-BYOS-Azure
python3-salt-3002.2-49.2
salt-3002.2-49.2
salt-minion-3002.2-49.2
Image SLES15-SP2-Manager-4-1-Proxy-BYOS-EC2-HVM
python3-salt-3002.2-49.2
salt-3002.2-49.2
salt-minion-3002.2-49.2
Image SLES15-SP2-Manager-4-1-Proxy-BYOS-GCE
python3-salt-3002.2-49.2
salt-3002.2-49.2
salt-minion-3002.2-49.2
Image SLES15-SP2-Manager-4-1-Server-BYOS-Azure
python3-salt-3002.2-49.2
salt-3002.2-49.2
salt-api-3002.2-49.2
salt-master-3002.2-49.2
salt-minion-3002.2-49.2
Image SLES15-SP2-Manager-4-1-Server-BYOS-EC2-HVM
python3-salt-3002.2-49.2
salt-3002.2-49.2
salt-api-3002.2-49.2
salt-master-3002.2-49.2
salt-minion-3002.2-49.2
Image SLES15-SP2-Manager-4-1-Server-BYOS-GCE
python3-salt-3002.2-49.2
salt-3002.2-49.2
salt-api-3002.2-49.2
salt-master-3002.2-49.2
salt-minion-3002.2-49.2
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production
python3-salt-3002.2-49.2
salt-3002.2-49.2
salt-standalone-formulas-configuration-3002.2-49.2
Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production
python3-salt-3002.2-49.2
salt-3002.2-49.2
salt-standalone-formulas-configuration-3002.2-49.2
Image SLES15-SP2-SAP-BYOS-Azure
python3-salt-3002.2-49.2
salt-3002.2-49.2
salt-minion-3002.2-49.2
salt-standalone-formulas-configuration-3002.2-49.2
Image SLES15-SP2-SAP-BYOS-EC2-HVM
python3-salt-3002.2-49.2
salt-3002.2-49.2
salt-minion-3002.2-49.2
salt-standalone-formulas-configuration-3002.2-49.2
Image SLES15-SP2-SAP-BYOS-GCE
python3-salt-3002.2-49.2
salt-3002.2-49.2
salt-minion-3002.2-49.2
salt-standalone-formulas-configuration-3002.2-49.2
SUSE Linux Enterprise Micro 5.0
python3-salt-3002.2-49.2
salt-3002.2-49.2
salt-minion-3002.2-49.2
salt-transactional-update-3002.2-49.2
SUSE Linux Enterprise Module for Basesystem 15 SP2
python3-salt-3002.2-49.2
salt-3002.2-49.2
salt-bash-completion-3002.2-49.2
salt-doc-3002.2-49.2
salt-minion-3002.2-49.2
salt-zsh-completion-3002.2-49.2
SUSE Linux Enterprise Module for Server Applications 15 SP2
salt-api-3002.2-49.2
salt-cloud-3002.2-49.2
salt-fish-completion-3002.2-49.2
salt-master-3002.2-49.2
salt-proxy-3002.2-49.2
salt-ssh-3002.2-49.2
salt-standalone-formulas-configuration-3002.2-49.2
salt-syndic-3002.2-49.2
SUSE Linux Enterprise Module for Transactional Server 15 SP2
salt-transactional-update-3002.2-49.2

Описание

An issue was discovered in SaltStack Salt before 3003.3. A user who has control of the source, and source_hash URLs can gain full file system access as root on a salt minion.


Затронутые продукты
Image SLES15-SP2-BYOS-Azure:python3-salt-3002.2-49.2
Image SLES15-SP2-BYOS-Azure:salt-3002.2-49.2
Image SLES15-SP2-BYOS-Azure:salt-minion-3002.2-49.2
Image SLES15-SP2-BYOS-EC2-HVM:python3-salt-3002.2-49.2

Ссылки