Safety vulnerability ID: 41953
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Salt 3003.3, 3002.7 and 3001.8 include a fix for CVE-2021-21996: An issue was discovered in SaltStack Salt before 3003.3. A user who has control of the source, and source_hash URLs can gain full file system access as root on a salt minion.
https://saltproject.io/security_announcements/salt-security-advisory-2021-sep-02/
Latest version: 3007.1
Portable, distributed, remote execution and configuration management system
========================
Version 3001.8 is a bug fix release for :ref:`3001 <release-3001>`.
Fixed
-----
- Verify the owner of an existing config before trusting it during install. If the owner cannot be verified, back it up and use defaults. (CVE-2021-22004)
Security
--------
- Fix the CVE-2021-31607 vulnerability
Additionally, an audit and a tool was put in place, ``bandit``, to address similar issues througout the code base, and prevent them. (CVE-2021-31607)
- Ensure that sourced file is cached using its hash name (cve-2021-21996)
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application