ArchLinux: 201710-12: salt: multiple issues
Summary
- CVE-2017-14695 (directory traversal)
It has been discovered that maliciously crafted minion IDs can cause
unwanted directory traversals on the salt-master. The flaw is within
the minion id validation which could allow certain minions to
authenticate to a master despite not having the correct credentials. To
exploit the vulnerability, an attacker must create a salt-minion with
an ID containing path seperators that will cause a directory traversal.
- CVE-2017-14696 (denial of service)
It has been discovered that salt incorrectly handled IDs with null
bytes in decoded payloads. A specially crafted authentication request
will crash the application while processing.
Resolution
Upgrade to 2017.7.2-1.
# pacman -Syu "salt>=2017.7.2-1"
The problems have been fixed upstream in version 2017.7.2.
References
https://groups.google.com/forum/#!topic/salt-announce/X8ZiQrZLujA https://github.com/saltstack/salt/commit/80d90307b07b3703428ecbb7c8bb468e28a9ae6d https://github.com/saltstack/salt/commit/5f8b5e1a0f23fe0f2be5b3c3e04199b57a53db5b https://security.archlinux.org/CVE-2017-14695 https://security.archlinux.org/CVE-2017-14696
Workaround
None.