Safety vulnerability ID: 50224
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Salt 3002.9, 3003.5 and 3004.2 include a fix for CVE-2022-22967: PAM auth fails to reject locked accounts, which allows a previously authorized user whose account is locked still run Salt commands when their account is locked. This affects both local shell accounts with an active session and salt-api users that authenticate via PAM eauth.
Latest version: 3007.1
Portable, distributed, remote execution and configuration management system
========================
Fixed
-----
- Fixed an error when running on CentOS Stream 8. (59161)
- Fix bug in tcp transport (61865)
- Make sure the correct key is being used when verifying or validating communication, eg. when a Salt syndic is involved use syndic_master.pub and when a Salt minion is involved use minion_master.pub. (61868)
Security
--------
- Fixed PAM auth to reject auth attempt if user account is locked. (cve-2022-22967)
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application