Salt security advisory release - 2022-JUNE-21
The Salt Project released a security update to Salt to address 1 vulnerability with severity rating High. If you are using PAM authentication from within Salt, we strongly recommend prioritizing this update. This is a security advisory release. This release includes fixes to the vulnerability and bug fixes from the previous CVE release.
The following CVE was fixed as part of this release:
CVE Details
CVE-2022-22967
- Description: PAM auth fails to reject locked accounts.
- Impact: A previously authorized user whose account is locked may still run Salt commands when their account is locked. This affects both local shell accounts with an active session and salt-api users that authenticate via PAM eauth.
- Solution: PAM account status is now correctly checked, rejecting locked accounts.
How to Mitigate
- Upgrade to 3002.9, 3003.5, or 3004.2.
- Alternatively, remove locked accounts rather than rely on Salt’s PAM eauth functionality.
- Or, change to a different eauth module.
- Attribution: https://github.com/ysf
- Severity Rating: 7.5 (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)
Packages
- Updated packages for the following versions can be found at https://repo.saltproject.io for these supported versions of Salt.
- 3004.2
- 3003.5
- 3002.9