0.17.1.rst 8.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260
  1. =========================
  2. Salt 0.17.1 Release Notes
  3. =========================
  4. :release: 2013-10-17
  5. .. note::
  6. THIS RELEASE IS NOT COMPATIBLE WITH PREVIOUS VERSIONS. If you update your
  7. master to 0.17.1, you must update your minions as well. Sorry for the
  8. inconvenience -- this is a result of one of the security fixes listed
  9. below.
  10. The 0.17.1 release comes with a number of improvements to salt-ssh, many
  11. bugfixes, and a number of security updates.
  12. Salt SSH has been improved to be faster, more featureful and more secure.
  13. Since the original release of Salt SSH was primarily a proof of concept, it has
  14. been very exciting to see its rapid adoption. We appreciate the willingness of
  15. security experts to review Salt SSH and help discover oversights and ensure
  16. that security issues only exist for such a tiny window of time.
  17. SSH Enhancements
  18. ================
  19. Shell Improvements
  20. ------------------
  21. Improvements to Salt SSH's communication have been added that improve routine
  22. execution regardless of the target system's login shell.
  23. Performance
  24. -----------
  25. Deployment of routines is now faster and takes fewer commands to execute.
  26. Security Updates
  27. ================
  28. Be advised that these security issues all apply to a small subset of Salt
  29. users and mostly apply to Salt SSH.
  30. Insufficient Argument Validation
  31. --------------------------------
  32. This issue allowed for a user with limited privileges to embed executions
  33. inside of routines to execute routines that should be restricted. This applies
  34. to users using external auth or client ACL and opening up specific routines.
  35. Be advised that these patches address the direct issue. Additional commits have
  36. been applied to help mitigate this issue from resurfacing.
  37. CVE
  38. ~~~
  39. CVE-2013-4435
  40. Affected Versions
  41. -----------------
  42. 0.15.0 - 0.17.0
  43. Patches
  44. ~~~~~~~
  45. https://github.com/saltstack/salt/commit/6d8ef68b605fd63c36bb8ed96122a75ad2e80269
  46. https://github.com/saltstack/salt/commit/ebdef37b7e5d2b95a01d34b211c61c61da67e46a
  47. https://github.com/saltstack/salt/commit/7f190ff890e47cdd591d9d7cefa5126574660824
  48. https://github.com/saltstack/salt/commit/8e5afe59cef6743fe5dbd510dcf463dbdfca1ced
  49. https://github.com/saltstack/salt/commit/aca78f314481082862e96d4f0c1b75fa382bb885
  50. https://github.com/saltstack/salt/commit/6a9752cdb1e8df2c9505ea910434c79d132eb1e2
  51. https://github.com/saltstack/salt/commit/b73677435ba54ecfc93c1c2d840a7f9ba6f53410
  52. https://github.com/saltstack/salt/commit/07972eb0a6f985749a55d8d4a2e471596591c80d
  53. https://github.com/saltstack/salt/commit/1e3f197726aa13ac5c3f2416000089f477f489b5
  54. Found By
  55. ~~~~~~~~
  56. Feth Arezki, of Majerti
  57. MITM SSH attack in salt-ssh
  58. ---------------------------
  59. SSH host keys were being accepted by default and not enforced on future SSH
  60. connections. These patches set SSH host key checking by default and can be
  61. overridden by passing the -i flag to `salt-ssh`.
  62. CVE
  63. ~~~
  64. CVE-2013-4436
  65. Affected Versions
  66. ~~~~~~~~~~~~~~~~~
  67. 0.17.0
  68. Found By
  69. ~~~~~~~~
  70. Michael Scherer, Red Hat
  71. Insecure Usage of /tmp in salt-ssh
  72. ----------------------------------
  73. The initial release of salt-ssh used the /tmp directory in an insecure way.
  74. These patches not only secure usage of files under /tmp in salt-ssh, but
  75. also add checksum validation for all packages sent into the now secure
  76. locations on target systems.
  77. CVE
  78. ~~~
  79. CVE-2013-4438
  80. Affected Versions
  81. ~~~~~~~~~~~~~~~~~
  82. 0.17.0
  83. Patches
  84. ~~~~~~~
  85. https://github.com/saltstack/salt/commit/aa4bb77ef230758cad84381dde0ec660d2dc340a
  86. https://github.com/saltstack/salt/commit/8f92b6b2cb2e4ec3af8783eb6bf4ff06f5a352cf
  87. https://github.com/saltstack/salt/commit/c58e56811d5a50c908df0597a0ba0b643b45ebfd
  88. https://github.com/saltstack/salt/commit/0359db9b46e47614cff35a66ea6a6a76846885d2
  89. https://github.com/saltstack/salt/commit/4348392860e0fd43701c331ac3e681cf1a8c17b0
  90. https://github.com/saltstack/salt/commit/664d1a1cac05602fad2693f6f97092d98a72bf61
  91. https://github.com/saltstack/salt/commit/bab92775a576e28ff9db262f32db9cf2375bba87
  92. https://github.com/saltstack/salt/commit/c6d34f1acf64900a3c87a2d37618ff414e5a704e
  93. Found By
  94. ~~~~~~~~
  95. Michael Scherer, Red Hat
  96. YAML Calling Unsafe Loading Routine
  97. -----------------------------------
  98. It has been argued that this is not a valid security issue, as the YAML loading
  99. that was happening was only being called after an initial gateway filter in
  100. Salt has already safely loaded the YAML and would fail if non-safe routines
  101. were embedded. Nonetheless, the CVE was filed and patches applied.
  102. CVE
  103. ~~~
  104. CVE-2013-4438
  105. Patches
  106. -------
  107. https://github.com/saltstack/salt/commit/339b0a51befae6b6b218ebcb55daa9cd3329a1c5
  108. Found By
  109. ~~~~~~~~
  110. Michael Scherer, Red Hat
  111. Failure to Drop Supplementary Group on Salt Master
  112. --------------------------------------------------
  113. If a salt master was started as a non-root user by the root user, root's
  114. groups would still be applied to the running process. This fix changes the
  115. process to have only the groups of the running user.
  116. CVE
  117. ~~~
  118. CVE not considered necessary by submitter.
  119. Affected Versions
  120. ~~~~~~~~~~~~~~~~~
  121. 0.11.0 - 0.17.0
  122. Patches
  123. ~~~~~~~
  124. https://github.com/saltstack/salt/commit/b89fa9135822d029795ab1eecd68cce2d1ced715
  125. Found By
  126. ~~~~~~~~
  127. Michael Scherer, Red Hat
  128. Failure to Validate Minions Posting Data
  129. ----------------------------------------
  130. This issue allowed a minion to pose as another authorized minion when posting
  131. data such as the mine data. All minions now pass through the id challenge
  132. before posting such data.
  133. CVE
  134. ~~~
  135. CVE-2013-4439
  136. Affected Versions
  137. ~~~~~~~~~~~~~~~~~
  138. 0.15.0 - 0.17.0
  139. Patches
  140. -------
  141. https://github.com/saltstack/salt/commit/7b850ff3d07ef6782888914ac4556c01e8a1c482
  142. https://github.com/saltstack/salt/commit/151759b2a1e1c6ce29277aa81b054219147f80fd
  143. Found By
  144. ~~~~~~~~
  145. David Anderson
  146. Fix Reference
  147. =============
  148. Version 0.17.1 is the first bugfix release for :ref:`0.17.0
  149. <release-0-17-0>`. The changes include:
  150. - Fix symbolic links in thin.tgz (:issue:`7482`)
  151. - Pass env through to file.patch state (:issue:`7452`)
  152. - Service provider fixes and reporting improvements (:issue:`7361`)
  153. - Add ``--priv`` option for specifying salt-ssh private key
  154. - Fix salt-thin's salt-call on setuptools installations (:issue:`7516`)
  155. - Fix salt-ssh to support passwords with spaces (:issue:`7480`)
  156. - Fix regression in wildcard includes (:issue:`7455`)
  157. - Fix salt-call outputter regression (:issue:`7456`)
  158. - Fix custom returner support for startup states (:issue:`7540`)
  159. - Fix value handling in augeas (:issue:`7605`)
  160. - Fix regression in apt (:issue:`7624`)
  161. - Fix minion ID guessing to use ``socket.getfqdn()`` first (:issue:`7558`)
  162. - Add minion ID caching (:issue:`7558`)
  163. - Fix salt-key race condition (:issue:`7304`)
  164. - Add ``--include-all`` flag to salt-key (:issue:`7399`)
  165. - Fix custom grains in pillar (part of :issue:`5716`, :issue:`6083`)
  166. - Fix race condition in salt-key (:issue:`7304`)
  167. - Fix regression in minion ID guessing, prioritize ``socket.getfqdn()``
  168. (:issue:`7558`)
  169. - Cache minion ID on first guess (:issue:`7558`)
  170. - Allow trailing slash in ``file.directory`` state
  171. - Fix reporting of file_roots in pillar return (:issue:`5449` and
  172. :issue:`5951`)
  173. - Remove pillar matching for mine.get (:issue:`7197`)
  174. - Sanitize args for multiple execution modules
  175. - Fix yumpkg mod_repo functions to filter hidden args (:issue:`7656`)
  176. - Fix conflicting IDs in state includes (:issue:`7526`)
  177. - Fix mysql_grants.absent string formatting issue (:issue:`7827`)
  178. - Fix postgres.version so it won't return None (:issue:`7695`)
  179. - Fix for trailing slashes in mount.mounted state
  180. - Fix rogue AttributErrors in the outputter system (:issue:`7845`)
  181. - Fix for incorrect ssh key encodings resulting in incorrect key added
  182. (:issue:`7718`)
  183. - Fix for pillar/grains naming regression in python renderer (:issue:`7693`)
  184. - Fix args/kwargs handling in the scheduler (:issue:`7422`)
  185. - Fix logfile handling for `file://`, `tcp://`, and `udp://` (:issue:`7754`)
  186. - Fix error handling in config file parsing (:issue:`6714`)
  187. - Fix RVM using sudo when running as non-root user (:issue:`2193`)
  188. - Fix client ACL and underlying logging bugs (:issue:`7706`)
  189. - Fix scheduler bug with returner (:issue:`7367`)
  190. - Fix user management bug related to default groups (:issue:`7690`)
  191. - Fix various salt-ssh bugs (:issue:`7528`)
  192. - Many various documentation fixes