|
|
Subscribe / Log in / New account

Arch Linux alert ASA-202001-7 (salt)

From:  Morten Linderud <foxboron@archlinux.org>
To:  arch-security@archlinux.org
Subject:  [ASA-202001-7] salt: arbitrary command execution
Date:  Tue, 4 Feb 2020 09:00:38 +0100
Message-ID:  <20200204080038.yznalcnq2qptse5a@anathema>

Arch Linux Security Advisory ASA-202001-7 ========================================= Severity: Medium Date : 2020-01-29 CVE-ID : CVE-2019-17361 Package : salt Type : arbitrary command execution Remote : Yes Link : https://security.archlinux.org/AVG-1087 Summary ======= The package salt before version 2019.2.3-1 is vulnerable to arbitrary command execution. Resolution ========== Upgrade to 2019.2.3-1. # pacman -Syu "salt>=2019.2.3-1" The problem has been fixed upstream in version 2019.2.3. Workaround ========== None. Description =========== With the Salt NetAPI enabled in addition to having a SSH roster defined, unauthenticated access is possible when specifying the client as SSH. Additionally, when the raw_shell option is specified any arbitrary command may be run on the Salt master when specifying SSH options. Impact ====== A remote unauthenticated attacker is able to execute arbitrary code on the affected host. References ========== https://docs.saltstack.com/en/latest/topics/releases/2019... https://github.com/saltstack/salt/commit/bca115f3f00fbde5... https://security.archlinux.org/CVE-2019-17361


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds