Security
Headlines
HeadlinesLatestCVEs

Headline

Gentoo Linux Security Advisory 202310-22

Gentoo Linux Security Advisory 202310-22 - Multiple vulnerabilities have been discovered in Salt, the worst of which could result in local privilege escalation. Versions greater than or equal to 3004.2 are affected.

Packet Storm
#vulnerability#web#mac#linux#intel

Gentoo Linux Security Advisory GLSA 202310-22


                                       https://security.gentoo.org/  

Severity: High
Title: Salt: Multiple Vulnerabilities
Date: October 31, 2023
Bugs: #767919, #812440, #836365, #855962
ID: 202310-22


Synopsis

Multiple vulnerabilities have been discovered in Salt, the worst of
which could result in local privilege escalation.

Background

Salt is a fast, intelligent and scalable automation engine.

Affected packages

Package Vulnerable Unaffected


app-admin/salt < 3004.2 >= 3004.2

Description

Multiple vulnerabilities have been discovered in Salt. Please review the
CVE identifiers referenced below for details.

Impact

Please review the referenced CVE identifiers for details.

Workaround

There is no known workaround at this time.

Resolution

All Salt users should upgrade to the latest version:

emerge --sync

emerge --ask --oneshot --verbose “>=app-admin/salt-3004.2”

References

[ 1 ] CVE-2020-28243
https://nvd.nist.gov/vuln/detail/CVE-2020-28243
[ 2 ] CVE-2020-28972
https://nvd.nist.gov/vuln/detail/CVE-2020-28972
[ 3 ] CVE-2020-35662
https://nvd.nist.gov/vuln/detail/CVE-2020-35662
[ 4 ] CVE-2021-3144
https://nvd.nist.gov/vuln/detail/CVE-2021-3144
[ 5 ] CVE-2021-3148
https://nvd.nist.gov/vuln/detail/CVE-2021-3148
[ 6 ] CVE-2021-3197
https://nvd.nist.gov/vuln/detail/CVE-2021-3197
[ 7 ] CVE-2021-21996
https://nvd.nist.gov/vuln/detail/CVE-2021-21996
[ 8 ] CVE-2021-25281
https://nvd.nist.gov/vuln/detail/CVE-2021-25281
[ 9 ] CVE-2021-25282
https://nvd.nist.gov/vuln/detail/CVE-2021-25282
[ 10 ] CVE-2021-25283
https://nvd.nist.gov/vuln/detail/CVE-2021-25283
[ 11 ] CVE-2021-25284
https://nvd.nist.gov/vuln/detail/CVE-2021-25284
[ 12 ] CVE-2021-31607
https://nvd.nist.gov/vuln/detail/CVE-2021-31607
[ 13 ] CVE-2022-22934
https://nvd.nist.gov/vuln/detail/CVE-2022-22934
[ 14 ] CVE-2022-22935
https://nvd.nist.gov/vuln/detail/CVE-2022-22935
[ 15 ] CVE-2022-22936
https://nvd.nist.gov/vuln/detail/CVE-2022-22936
[ 16 ] CVE-2022-22941
https://nvd.nist.gov/vuln/detail/CVE-2022-22941
[ 17 ] CVE-2022-22967
https://nvd.nist.gov/vuln/detail/CVE-2022-22967

Availability

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

https://security.gentoo.org/glsa/202310-22

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users’ machines is of utmost
importance to us. Any security concerns should be addressed to
[email protected] or alternatively, you may file a bug at
https://bugs.gentoo.org.

License

Copyright 2023 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

https://creativecommons.org/licenses/by-sa/2.5

Related news

Ubuntu Security Notice USN-6948-1

Ubuntu Security Notice 6948-1 - It was discovered that Salt incorrectly handled crafted web requests. A remote attacker could possibly use this issue to run arbitrary commands. It was discovered that Salt incorrectly created certificates with weak file permissions. It was discovered that Salt incorrectly handled credential validation. A remote attacker could possibly use this issue to bypass authentication.

CVE-2022-46756: DSA-2022-335: Dell VxRail Security Update for Multiple Third-Party Component Vulnerabilities

Dell VxRail, versions prior to 7.0.410, contain a Container Escape Vulnerability. A local high-privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the container's underlying OS. Exploitation may lead to a system take over by an attacker.

CVE-2022-34456: DSA-2022-267: Dell EMC Metronode VS5 Security Update for Multiple Third-Party Component Vulnerabilities

Dell EMC Metro node, Version(s) prior to 7.1, contain a Code Injection Vulnerability. An authenticated nonprivileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application.

CVE-2022-34456: DSA-2022-267: Dell EMC Metronode VS5 Security Update for Multiple Third-Party Component Vulnerabilities

Dell EMC Metro node, Version(s) prior to 7.1, contain a Code Injection Vulnerability. An authenticated nonprivileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application.

CVE-2022-34456: DSA-2022-267: Dell EMC Metronode VS5 Security Update for Multiple Third-Party Component Vulnerabilities

Dell EMC Metro node, Version(s) prior to 7.1, contain a Code Injection Vulnerability. An authenticated nonprivileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application.

CVE-2022-34456: DSA-2022-267: Dell EMC Metronode VS5 Security Update for Multiple Third-Party Component Vulnerabilities

Dell EMC Metro node, Version(s) prior to 7.1, contain a Code Injection Vulnerability. An authenticated nonprivileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application.

CVE-2022-34456: DSA-2022-267: Dell EMC Metronode VS5 Security Update for Multiple Third-Party Component Vulnerabilities

Dell EMC Metro node, Version(s) prior to 7.1, contain a Code Injection Vulnerability. An authenticated nonprivileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application.

CVE-2022-34456: DSA-2022-267: Dell EMC Metronode VS5 Security Update for Multiple Third-Party Component Vulnerabilities

Dell EMC Metro node, Version(s) prior to 7.1, contain a Code Injection Vulnerability. An authenticated nonprivileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application.

CVE-2022-34456: DSA-2022-267: Dell EMC Metronode VS5 Security Update for Multiple Third-Party Component Vulnerabilities

Dell EMC Metro node, Version(s) prior to 7.1, contain a Code Injection Vulnerability. An authenticated nonprivileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application.

CVE-2022-34456: DSA-2022-267: Dell EMC Metronode VS5 Security Update for Multiple Third-Party Component Vulnerabilities

Dell EMC Metro node, Version(s) prior to 7.1, contain a Code Injection Vulnerability. An authenticated nonprivileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application.

CVE-2022-34456: DSA-2022-267: Dell EMC Metronode VS5 Security Update for Multiple Third-Party Component Vulnerabilities

Dell EMC Metro node, Version(s) prior to 7.1, contain a Code Injection Vulnerability. An authenticated nonprivileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application.

CVE-2022-34456: DSA-2022-267: Dell EMC Metronode VS5 Security Update for Multiple Third-Party Component Vulnerabilities

Dell EMC Metro node, Version(s) prior to 7.1, contain a Code Injection Vulnerability. An authenticated nonprivileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application.

GHSA-fpxm-fprw-6hxj: Salt's PAM auth fails to reject locked accounts

An issue was discovered in SaltStack Salt in versions before 3002.9, 3003.5, 3004.2. PAM auth fails to reject locked accounts, which allows a previously authorized user whose account is locked still run Salt commands when their account is locked. This affects both local shell accounts with an active session and salt-api users that authenticate via PAM eauth.

CVE-2022-22967: Salt Project Package Repo

An issue was discovered in SaltStack Salt in versions before 3002.9, 3003.5, 3004.2. PAM auth fails to reject locked accounts, which allows a previously authorized user whose account is locked still run Salt commands when their account is locked. This affects both local shell accounts with an active session and salt-api users that authenticate via PAM eauth.

Packet Storm: Latest News

Pyload Remote Code Execution