-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.0275
                           salt security update
                              25 January 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           salt
Publisher:         Debian
Operating System:  Debian GNU/Linux
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                   Unauthorised Access             -- Remote/Unauthenticated
                   Access Confidential Data        -- Existing Account      
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-25592 CVE-2020-17490 CVE-2020-16846

Reference:         ESB-2020.4395
                   ESB-2020.4300
                   ESB-2020.3923
                   ESB-2020.3922

Original Bulletin: 
   http://www.debian.org/security/2021/dsa-4837

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-4837-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
January 24, 2021                      https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : salt
CVE ID         : CVE-2020-16846 CVE-2020-17490 CVE-2020-25592

Several vulnerabilities were discovered in salt, a powerful remote
execution manager. The flaws could result in authentication bypass and
invocation of Salt SSH, creation of certificates with weak file
permissions via the TLS execution module or shell injections with the
Salt API using the SSH client.

For the stable distribution (buster), these problems have been fixed in
version 2018.3.4+dfsg1-6+deb10u2.

We recommend that you upgrade your salt packages.

For the detailed security status of salt please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/salt

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
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=1Rmw
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=RSTX
-----END PGP SIGNATURE-----