Skip to content

Commit

Permalink
Update docs 3001.5
Browse files Browse the repository at this point in the history
  • Loading branch information
Frode Gundersen authored and dwoz committed Jan 25, 2021
1 parent 9a816c2 commit d19b1da
Show file tree
Hide file tree
Showing 13 changed files with 137 additions and 20 deletions.
55 changes: 55 additions & 0 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
Expand Up @@ -7,6 +7,34 @@ Versions are `MAJOR.PATCH`.

# Changelog

Salt 3001.5 (2021-01-25)
========================

Fixed
-----

- CVE-2020-28243 - Fix local privilege escalation in the restartcheck module. (CVE-2020-28243)
- CVE-2020-28972 - Ensure authentication to vcenter, vsphere, and esxi server
validates the SSL/TLS certificate by default. If you want to skip SSL verification
you can use `verify_ssl: False`. (CVE-2020-28972)
- CVE-2020-35662 - Ensure the asam runner, qingcloud, splunk returner, panos
proxy, cimc proxy, zenoss module, esxi module, vsphere module, glassfish
module, bigip module, and keystone module validate SSL by default. If you want
to skip SSL verification you can use `verify_ssl: False`. (CVE-2020-35662)
- CVE-2021-25281 - Fix salt-api so it honors eauth credentials for the
wheel_async client. (CVE-2021-25281)
- CVE-2021-25282 - Fix the salt.wheel.pillar_roots.write method so it is not
vulnerable to directory traversal. (CVE-2021-25282)
- CVE-2021-25283 - Fix the jinja render to protect against server side template
injection attacks. (CVE-2021-25283)
- CVE-2021-25284 - Fix cmdmod so it will not log credentials to log levels info
and error. (CVE-2021-25284)
- CVE-2021-3144 - Fix eauth tokens can be used once after expiration. (CVE-2021-3144)
- CVE-2021-3148 - Fix a command injection in the Salt-API when using the Salt-SSH client. (CVE-2021-3148)
- CVE-2021-3197 - Fix ssh client to remove ProxyCommand from arguments provided
by cli and netapi. (CVE-2021-3197)


Salt 3001.4 (2020-12-01)
========================

Expand Down Expand Up @@ -454,6 +482,33 @@ Added
- Added `efi` parameter to virt module, so `uefi` firmware can be auto selected. (#57397)
- [#56637](https://github.com/saltstack/salt/pull/56637) - Add ``win_wua.installed`` to the ``win_wua`` execution module

Salt 3000.7
===========

Fixed
-----

- CVE-2020-28243 - Fix local privilege escalation in the restartcheck module. (CVE-2020-28243)
- CVE-2020-28972 - Ensure authentication to vcenter, vsphere, and esxi server
validates the SSL/TLS certificate by default. If you want to skip SSL verification
you can use `verify_ssl: False`. (CVE-2020-28972)
- CVE-2020-35662 - Ensure the asam runner, qingcloud, splunk returner, panos
proxy, cimc proxy, zenoss module, esxi module, vsphere module, glassfish
module, bigip module, and keystone module validate SSL by default. If you want
to skip SSL verification you can use `verify_ssl: False`. (CVE-2020-35662)
- CVE-2021-25281 - Fix salt-api so it honors eauth credentials for the
wheel_async client. (CVE-2021-25281)
- CVE-2021-25282 - Fix the salt.wheel.pillar_roots.write method so it is not
vulnerable to directory traversal. (CVE-2021-25282)
- CVE-2021-25283 - Fix the jinja render to protect against server side template
injection attacks. (CVE-2021-25283)
- CVE-2021-25284 - Fix cmdmod so it will not log credentials to log levels info
and error. (CVE-2021-25284)
- CVE-2021-3144 - Fix eauth tokens can be used once after expiration. (CVE-2021-3144)
- CVE-2021-3148 - Fix a command injection in the Salt-API when using the Salt-SSH client. (CVE-2021-3148)
- CVE-2021-3197 - Fix ssh client to remove ProxyCommand from arguments provided
by cli and netapi. (CVE-2021-3197)

Salt 3000.6
===========

Expand Down
1 change: 0 additions & 1 deletion changelog/CVE-2020-28243.fixed

This file was deleted.

3 changes: 0 additions & 3 deletions changelog/CVE-2020-28972.fixed

This file was deleted.

4 changes: 0 additions & 4 deletions changelog/CVE-2020-35662.fixed

This file was deleted.

2 changes: 0 additions & 2 deletions changelog/CVE-2021-25281.fixed

This file was deleted.

2 changes: 0 additions & 2 deletions changelog/CVE-2021-25282.fixed

This file was deleted.

2 changes: 0 additions & 2 deletions changelog/CVE-2021-25283.fixed

This file was deleted.

2 changes: 0 additions & 2 deletions changelog/CVE-2021-25284.fixed

This file was deleted.

1 change: 0 additions & 1 deletion changelog/CVE-2021-3144.fixed

This file was deleted.

1 change: 0 additions & 1 deletion changelog/CVE-2021-3148.fixed

This file was deleted.

2 changes: 0 additions & 2 deletions changelog/CVE-2021-3197.fixed

This file was deleted.

41 changes: 41 additions & 0 deletions doc/topics/releases/3000.7.rst
Original file line number Diff line number Diff line change
@@ -0,0 +1,41 @@
.. _release-3000-7:

=========================
Salt 3000.7 Release Notes
=========================

Version 3000.7 is a CVE fix release for :ref:`3000 <release-3000>`.

Fixed
-----

- CVE-2020-28243 - Fix local privilege escalation in the restartcheck module.

- CVE-2020-28972 - Ensure authentication to vcenter, vsphere, and esxi server
validates the SSL/TLS certificate by default. If you want to skip SSL verification
you can use `verify_ssl: False`.

- CVE-2020-35662 - Ensure the asam runner, qingcloud, splunk returner, panos
proxy, cimc proxy, zenoss module, esxi module, vsphere module, glassfish
module, bigip module, and keystone module validate SSL by default. If you want
to skip SSL verification you can use `verify_ssl: False`.

- CVE-2021-3148 - Fix a command injection in the Salt-API when using the
Salt-SSH client.

- CVE-2021-3144 - Fix eauth tokens can be used once after expiration

- CVE-2021-25281 - Fix salt-api so it honors eauth credentials for the
wheel_async client.

- CVE-2021-25282 - Fix the salt.wheel.pillar_roots.write method so it is not
vulnerable to directory traversal.

- CVE-2021-25283 - Fix the jinja render to protect against server side template
injection attacks.

- CVE-2021-25284 - Fix cmdmod so it will not log credentials to log levels info
and error.

- CVE-2021-3197 - Fix ssh client to remove ProxyCommand from arguments provided
by cli and netapi.
41 changes: 41 additions & 0 deletions doc/topics/releases/3001.5.rst
Original file line number Diff line number Diff line change
@@ -0,0 +1,41 @@
.. _release-3001-5:

=========================
Salt 3001.5 Release Notes
=========================

Version 3001.5 is a CVE fix release for :ref:`3001 <release-3001>`.

Fixed
-----

- CVE-2020-28243 - Fix local privilege escalation in the restartcheck module.

- CVE-2020-28972 - Ensure authentication to vcenter, vsphere, and esxi server
validates the SSL/TLS certificate by default. If you want to skip SSL verification
you can use `verify_ssl: False`.

- CVE-2020-35662 - Ensure the asam runner, qingcloud, splunk returner, panos
proxy, cimc proxy, zenoss module, esxi module, vsphere module, glassfish
module, bigip module, and keystone module validate SSL by default. If you want
to skip SSL verification you can use `verify_ssl: False`.

- CVE-2021-3148 - Fix a command injection in the Salt-API when using the
Salt-SSH client.

- CVE-2021-3144 - Fix eauth tokens can be used once after expiration

- CVE-2021-25281 - Fix salt-api so it honors eauth credentials for the
wheel_async client.

- CVE-2021-25282 - Fix the salt.wheel.pillar_roots.write method so it is not
vulnerable to directory traversal.

- CVE-2021-25283 - Fix the jinja render to protect against server side template
injection attacks.

- CVE-2021-25284 - Fix cmdmod so it will not log credentials to log levels info
and error.

- CVE-2021-3197 - Fix ssh client to remove ProxyCommand from arguments provided
by cli and netapi.

0 comments on commit d19b1da

Please sign in to comment.