Описание
Security update for salt
This update for salt fixes the following issues:
- Support querying for JSON data in external sql pillar.
- Exclude the full path of a download URL to prevent injection of malicious code. (bsc#1190265, CVE-2021-21996)
Список пакетов
Image SLES15-SP2-BYOS-Azure
python3-salt-3002.2-49.2
salt-3002.2-49.2
salt-minion-3002.2-49.2
Image SLES15-SP2-BYOS-EC2-HVM
python3-salt-3002.2-49.2
salt-3002.2-49.2
salt-minion-3002.2-49.2
Image SLES15-SP2-BYOS-GCE
python3-salt-3002.2-49.2
salt-3002.2-49.2
salt-minion-3002.2-49.2
Image SLES15-SP2-HPC-BYOS-Azure
python3-salt-3002.2-49.2
salt-3002.2-49.2
salt-minion-3002.2-49.2
Image SLES15-SP2-HPC-BYOS-EC2-HVM
python3-salt-3002.2-49.2
salt-3002.2-49.2
salt-minion-3002.2-49.2
Image SLES15-SP2-Manager-4-1-Proxy-BYOS-Azure
python3-salt-3002.2-49.2
salt-3002.2-49.2
salt-minion-3002.2-49.2
Image SLES15-SP2-Manager-4-1-Proxy-BYOS-EC2-HVM
python3-salt-3002.2-49.2
salt-3002.2-49.2
salt-minion-3002.2-49.2
Image SLES15-SP2-Manager-4-1-Proxy-BYOS-GCE
python3-salt-3002.2-49.2
salt-3002.2-49.2
salt-minion-3002.2-49.2
Image SLES15-SP2-Manager-4-1-Server-BYOS-Azure
python3-salt-3002.2-49.2
salt-3002.2-49.2
salt-api-3002.2-49.2
salt-master-3002.2-49.2
salt-minion-3002.2-49.2
Image SLES15-SP2-Manager-4-1-Server-BYOS-EC2-HVM
python3-salt-3002.2-49.2
salt-3002.2-49.2
salt-api-3002.2-49.2
salt-master-3002.2-49.2
salt-minion-3002.2-49.2
Image SLES15-SP2-Manager-4-1-Server-BYOS-GCE
python3-salt-3002.2-49.2
salt-3002.2-49.2
salt-api-3002.2-49.2
salt-master-3002.2-49.2
salt-minion-3002.2-49.2
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production
python3-salt-3002.2-49.2
salt-3002.2-49.2
salt-standalone-formulas-configuration-3002.2-49.2
Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production
python3-salt-3002.2-49.2
salt-3002.2-49.2
salt-standalone-formulas-configuration-3002.2-49.2
Image SLES15-SP2-SAP-BYOS-Azure
python3-salt-3002.2-49.2
salt-3002.2-49.2
salt-minion-3002.2-49.2
salt-standalone-formulas-configuration-3002.2-49.2
Image SLES15-SP2-SAP-BYOS-EC2-HVM
python3-salt-3002.2-49.2
salt-3002.2-49.2
salt-minion-3002.2-49.2
salt-standalone-formulas-configuration-3002.2-49.2
Image SLES15-SP2-SAP-BYOS-GCE
python3-salt-3002.2-49.2
salt-3002.2-49.2
salt-minion-3002.2-49.2
salt-standalone-formulas-configuration-3002.2-49.2
SUSE Linux Enterprise Micro 5.0
python3-salt-3002.2-49.2
salt-3002.2-49.2
salt-minion-3002.2-49.2
salt-transactional-update-3002.2-49.2
SUSE Linux Enterprise Module for Basesystem 15 SP2
python3-salt-3002.2-49.2
salt-3002.2-49.2
salt-bash-completion-3002.2-49.2
salt-doc-3002.2-49.2
salt-minion-3002.2-49.2
salt-zsh-completion-3002.2-49.2
SUSE Linux Enterprise Module for Server Applications 15 SP2
salt-api-3002.2-49.2
salt-cloud-3002.2-49.2
salt-fish-completion-3002.2-49.2
salt-master-3002.2-49.2
salt-proxy-3002.2-49.2
salt-ssh-3002.2-49.2
salt-standalone-formulas-configuration-3002.2-49.2
salt-syndic-3002.2-49.2
SUSE Linux Enterprise Module for Transactional Server 15 SP2
salt-transactional-update-3002.2-49.2
Ссылки
- Link for SUSE-SU-2021:3556-1
- E-Mail link for SUSE-SU-2021:3556-1
- SUSE Security Ratings
- SUSE Bug 1190265
- SUSE CVE CVE-2021-21996 page
Описание
An issue was discovered in SaltStack Salt before 3003.3. A user who has control of the source, and source_hash URLs can gain full file system access as root on a salt minion.
Затронутые продукты
Image SLES15-SP2-BYOS-Azure:python3-salt-3002.2-49.2
Image SLES15-SP2-BYOS-Azure:salt-3002.2-49.2
Image SLES15-SP2-BYOS-Azure:salt-minion-3002.2-49.2
Image SLES15-SP2-BYOS-EC2-HVM:python3-salt-3002.2-49.2
Ссылки
- CVE-2021-21996
- SUSE Bug 1190265
- SUSE Bug 1210934