SECURITY: Fedora 33 Update: salt-3002.5-1.fc33
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2021-5756fbf8a6
2021-03-02 15:54:53.504811
--------------------------------------------------------------------------------
Name : salt
Product : Fedora 33
Version : 3002.5
Release : 1.fc33
URL : http://saltstack.org/
Summary : A parallel remote execution system
Description :
Salt is a distributed remote execution system used to execute commands and
query data. It was developed in order to bring the best solutions found in
the world of remote execution together and make them better, faster and more
malleable. Salt accomplishes this via its ability to handle larger loads of
information, and not just dozens, but hundreds or even thousands of individual
servers, handle them quickly and through a simple and manageable interface.
--------------------------------------------------------------------------------
Update Information:
Update to CVE release 3002.5-1 for Python 3 Fixed on this release:
CVE-2021-25283 Fixed in 3002.3: CVE-2020-28243 CVE-2020-28972 CVE-2020-35662
CVE-2021-3148 CVE-2021-3144 CVE-2021-25281 CVE-2021-25282 CVE-2021-25283
CVE-2021-25284 CVE-2021-25284 CVE-2021-3197
--------------------------------------------------------------------------------
ChangeLog:
* Fri Feb 26 2021 SaltStack Packaging Team - 3002.5-1
- Update to CVE release 3002.5-1 for Python 3
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #1933324 - CVE-2021-3197 salt: Shell injection by including ProxyCommand in an argument [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1933324
[ 2 ] Bug #1933326 - CVE-2021-25281 salt: API does not honor eAuth credentials for the wheel_async client [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1933326
[ 3 ] Bug #1933329 - CVE-2021-25282 salt: Directory traversal in wheel.pillar_roots.write [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1933329
[ 4 ] Bug #1933332 - CVE-2021-25283 salt: Jinja renderer does not protect against server-side template injection attacks [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1933332
[ 5 ] Bug #1933337 - CVE-2021-3148 salt: Command injection in salt.utils.thin.gen_thin() [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1933337
[ 6 ] Bug #1933340 - CVE-2021-25284 salt: webutils write passwords in cleartext to /var/log/salt/minion [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1933340
[ 7 ] Bug #1933343 - CVE-2020-35662 salt: Certain modules do not always validated SSL certificates [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1933343
[ 8 ] Bug #1933345 - CVE-2021-3144 salt: eauth tokens can be used once after expiration [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1933345
[ 9 ] Bug #1933348 - CVE-2020-28972 salt: Authentication to vCenter, vSphere, and ESXi servers does not always validate the SSL/TLS certificate [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1933348
[ 10 ] Bug #1933351 - CVE-2020-28243 salt: Privilege escalation on a minion when an unprivileged user is able to create files in any non-blacklisted directory [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1933351
--------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2021-5756fbf8a6' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
A salt security update has been released for Fedora 33.