- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory                           GLSA 202310-22
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                                           https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Severity: High
    Title: Salt: Multiple Vulnerabilities
     Date: October 31, 2023
     Bugs: #767919, #812440, #836365, #855962
       ID: 202310-22

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
========

Multiple vulnerabilities have been discovered in Salt, the worst of
which could result in local privilege escalation.

Background
==========

Salt is a fast, intelligent and scalable automation engine.

Affected packages
=================

Package         Vulnerable    Unaffected
--------------  ------------  ------------
app-admin/salt  < 3004.2      >= 3004.2

Description
===========

Multiple vulnerabilities have been discovered in Salt. Please review the
CVE identifiers referenced below for details.

Impact
======

Please review the referenced CVE identifiers for details.

Workaround
==========

There is no known workaround at this time.

Resolution
==========

All Salt users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose ">=app-admin/salt-3004.2"

References
==========

[ 1 ] CVE-2020-28243
      https://nvd.nist.gov/vuln/detail/CVE-2020-28243
[ 2 ] CVE-2020-28972
      https://nvd.nist.gov/vuln/detail/CVE-2020-28972
[ 3 ] CVE-2020-35662
      https://nvd.nist.gov/vuln/detail/CVE-2020-35662
[ 4 ] CVE-2021-3144
      https://nvd.nist.gov/vuln/detail/CVE-2021-3144
[ 5 ] CVE-2021-3148
      https://nvd.nist.gov/vuln/detail/CVE-2021-3148
[ 6 ] CVE-2021-3197
      https://nvd.nist.gov/vuln/detail/CVE-2021-3197
[ 7 ] CVE-2021-21996
      https://nvd.nist.gov/vuln/detail/CVE-2021-21996
[ 8 ] CVE-2021-25281
      https://nvd.nist.gov/vuln/detail/CVE-2021-25281
[ 9 ] CVE-2021-25282
      https://nvd.nist.gov/vuln/detail/CVE-2021-25282
[ 10 ] CVE-2021-25283
      https://nvd.nist.gov/vuln/detail/CVE-2021-25283
[ 11 ] CVE-2021-25284
      https://nvd.nist.gov/vuln/detail/CVE-2021-25284
[ 12 ] CVE-2021-31607
      https://nvd.nist.gov/vuln/detail/CVE-2021-31607
[ 13 ] CVE-2022-22934
      https://nvd.nist.gov/vuln/detail/CVE-2022-22934
[ 14 ] CVE-2022-22935
      https://nvd.nist.gov/vuln/detail/CVE-2022-22935
[ 15 ] CVE-2022-22936
      https://nvd.nist.gov/vuln/detail/CVE-2022-22936
[ 16 ] CVE-2022-22941
      https://nvd.nist.gov/vuln/detail/CVE-2022-22941
[ 17 ] CVE-2022-22967
      https://nvd.nist.gov/vuln/detail/CVE-2022-22967

Availability
============

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

 https://security.gentoo.org/glsa/202310-22

Concerns?
=========

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
=======

Copyright 2023 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

https://creativecommons.org/licenses/by-sa/2.5/

Gentoo: GLSA-202310-22: Salt: Multiple Vulnerabilities

Multiple vulnerabilities have been discovered in Salt, the worst of which could result in local privilege escalation.

Summary

Multiple vulnerabilities have been discovered in Salt. Please review the CVE identifiers referenced below for details.

Resolution

All Salt users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=app-admin/salt-3004.2"

References

[ 1 ] CVE-2020-28243 https://nvd.nist.gov/vuln/detail/CVE-2020-28243 [ 2 ] CVE-2020-28972 https://nvd.nist.gov/vuln/detail/CVE-2020-28972 [ 3 ] CVE-2020-35662 https://nvd.nist.gov/vuln/detail/CVE-2020-35662 [ 4 ] CVE-2021-3144 https://nvd.nist.gov/vuln/detail/CVE-2021-3144 [ 5 ] CVE-2021-3148 https://nvd.nist.gov/vuln/detail/CVE-2021-3148 [ 6 ] CVE-2021-3197 https://nvd.nist.gov/vuln/detail/CVE-2021-3197 [ 7 ] CVE-2021-21996 https://nvd.nist.gov/vuln/detail/CVE-2021-21996 [ 8 ] CVE-2021-25281 https://nvd.nist.gov/vuln/detail/CVE-2021-25281 [ 9 ] CVE-2021-25282 https://nvd.nist.gov/vuln/detail/CVE-2021-25282 [ 10 ] CVE-2021-25283 https://nvd.nist.gov/vuln/detail/CVE-2021-25283 [ 11 ] CVE-2021-25284 https://nvd.nist.gov/vuln/detail/CVE-2021-25284 [ 12 ] CVE-2021-31607 https://nvd.nist.gov/vuln/detail/CVE-2021-31607 [ 13 ] CVE-2022-22934 https://nvd.nist.gov/vuln/detail/CVE-2022-22934 [ 14 ] CVE-2022-22935 https://nvd.nist.gov/vuln/detail/CVE-2022-22935 [ 15 ] CVE-2022-22936 https://nvd.nist.gov/vuln/detail/CVE-2022-22936 [ 16 ] CVE-2022-22941 https://nvd.nist.gov/vuln/detail/CVE-2022-22941 [ 17 ] CVE-2022-22967 https://nvd.nist.gov/vuln/detail/CVE-2022-22967

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
https://security.gentoo.org/glsa/202310-22

Concerns

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.

Severity
Severity: High
Title: Salt: Multiple Vulnerabilities
Date: October 31, 2023
Bugs: #767919, #812440, #836365, #855962
ID: 202310-22

Synopsis

Multiple vulnerabilities have been discovered in Salt, the worst of which could result in local privilege escalation.

Background

Salt is a fast, intelligent and scalable automation engine.

Affected Packages

Package Vulnerable Unaffected -------------- ------------ ------------ app-admin/salt < 3004.2 >= 3004.2

Impact

Please review the referenced CVE identifiers for details.

Workaround

There is no known workaround at this time.

Related News

News

Powered By

Footer Logo

Linux Security - Your source for Top Linux News, Advisories, HowTo's and Feature Release.

Powered By

Footer Logo