mirror of
https://github.com/valitydev/salt.git
synced 2024-11-07 17:09:03 +00:00
Update advisories
This commit is contained in:
parent
28a2baae83
commit
2f869f8dc3
@ -1,47 +1,76 @@
|
||||
=========================
|
||||
Salt 0.15.1 Release Notes
|
||||
=========================
|
||||
|
||||
The 0.15.1 release has been posed, this release includes fixes to a number of
|
||||
bugs in 0.15.1 and a three security patches.
|
||||
|
||||
Security Updates
|
||||
================
|
||||
|
||||
A number of security issues have been resolved via the 0.15.1 release.
|
||||
|
||||
Path Injection in Minion IDs
|
||||
----------------------------
|
||||
|
||||
A minion could spoof authentication by injecting path changes in the id, this
|
||||
allowed a minion to authenticate itself without validation.
|
||||
|
||||
Patch
|
||||
~~~~~
|
||||
|
||||
https://github.com/saltstack/salt/commit/5427b9438e452a5a8910d9128c6aafb45d8fd5d3
|
||||
https://github.com/saltstack/salt/commit/7560908ee62351769c3cd43b03d74c1ca772cc52
|
||||
|
||||
RSA Key Generation Fault
|
||||
------------------------
|
||||
|
||||
RSA Key generation was not in compliance with with current standards, all RSA
|
||||
keys are recommended to be regenerated. A tool was included in 0.15.1 to assist
|
||||
in mass key regeneration, the manage.regen_keys runner.
|
||||
|
||||
Patch
|
||||
~~~~~
|
||||
|
||||
https://github.com/saltstack/salt/commit/5dd304276ba5745ec21fc1e6686a0b28da29e6fc
|
||||
|
||||
Command Injection Via ext_pillar
|
||||
--------------------------------
|
||||
|
||||
Shell commands could be executed on the master when requesting a pillar.
|
||||
Ext pillar options have been restricted to only allow safe external pillars to
|
||||
be called when prompted by the minion.
|
||||
|
||||
Patch
|
||||
~~~~~
|
||||
|
||||
https://github.com/saltstack/salt/commit/43d8c16bd26159d827d1a945c83ac28159ec5865
|
||||
=========================
|
||||
Salt 0.15.1 Release Notes
|
||||
=========================
|
||||
|
||||
The 0.15.1 release has been posed, this release includes fixes to a number of
|
||||
bugs in 0.15.1 and a three security patches.
|
||||
|
||||
Security Updates
|
||||
================
|
||||
|
||||
A number of security issues have been resolved via the 0.15.1 release.
|
||||
|
||||
Path Injection in Minion IDs
|
||||
----------------------------
|
||||
|
||||
Salt masters did not properly validate the id of a connecting minion. This can lead to an attacker uploading files to the master in arbitrary locations. In particular this can be used to bypass the manual validation of new unknown minions. Exploiting this vulnerability does not require authentication.
|
||||
|
||||
This issue affects all known versions of Salt.
|
||||
|
||||
This issue was reported by Ronald Volgers.
|
||||
|
||||
Patch
|
||||
~~~~~
|
||||
|
||||
The issue is fixed in Salt 0.15.1. Updated packages are available in the usual locations.
|
||||
|
||||
Specific commits:
|
||||
|
||||
https://github.com/saltstack/salt/commit/5427b9438e452a5a8910d9128c6aafb45d8fd5d3
|
||||
https://github.com/saltstack/salt/commit/7560908ee62351769c3cd43b03d74c1ca772cc52
|
||||
|
||||
RSA Key Generation Fault
|
||||
------------------------
|
||||
|
||||
RSA key generation was done incorrectly, leading to very insecure keys. It is recommended to regenerate all RSA keys.
|
||||
|
||||
This issue can be used to impersonate Salt masters or minions, or decrypt any transferred data.
|
||||
|
||||
This issue can only be exploited by attackers who are able to observe or modify traffic between Salt minions and the legitimate Salt master.
|
||||
|
||||
A tool was included in 0.15.1 to assist in mass key regeneration, the manage.regen_keys runner.
|
||||
|
||||
This issue affects all known versions of Salt.
|
||||
|
||||
This issue was reported by Ronald Volgers.
|
||||
|
||||
|
||||
Patch
|
||||
~~~~~
|
||||
|
||||
The issue is fixed in Salt 0.15.1. Updated packages are available in the usual locations.
|
||||
|
||||
Specific commits:
|
||||
|
||||
https://github.com/saltstack/salt/commit/5dd304276ba5745ec21fc1e6686a0b28da29e6fc
|
||||
|
||||
Command Injection Via ext_pillar
|
||||
--------------------------------
|
||||
|
||||
Arbitrary shell commands could be executed on the master by an authenticated minion through options passed when requesting a pillar.
|
||||
|
||||
Ext pillar options have been restricted to only allow safe external pillars to be called when prompted by the minion.
|
||||
|
||||
This issue affects all known versions of Salt.
|
||||
|
||||
This issue was reported by Ronald Volgers.
|
||||
|
||||
Patch
|
||||
~~~~~
|
||||
|
||||
The issue is fixed in Salt 0.15.1. Updated packages are available in the usual locations.
|
||||
|
||||
Specific commits:
|
||||
|
||||
https://github.com/saltstack/salt/commit/43d8c16bd26159d827d1a945c83ac28159ec5865
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user