1
0

2015.5.10.rst 1.4 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546
  1. ============================
  2. Salt 2015.5.10 Release Notes
  3. ============================
  4. :release: 2015-03-22
  5. Version 2015.5.10 is a bugfix release for :ref:`2015.5.0 <release-2015-5-0>`.
  6. Security Fix
  7. ============
  8. **CVE-2016-3176** Insecure configuration of PAM external authentication service
  9. This issue affects all Salt versions prior to 2015.8.8/2015.5.10 when PAM
  10. :ref:`external authentication <acl-eauth>` is enabled. This issue involves
  11. passing an alternative PAM authentication service with a command that is sent
  12. to :ref:`LocalClient <local-client>`, enabling the attacker to bypass the
  13. configured authentication service. Thank you to Dylan Frese <dmfrese@gmail.com>
  14. for bringing this issue to our attention.
  15. This update defines the PAM eAuth ``service`` that users authenticate against
  16. in the Salt Master configuration.
  17. No additional fixes are included in this release.
  18. Read Before Upgrading Debian 8 (Jessie) from Salt Versions Earlier than 2015.5.9
  19. ================================================================================
  20. Salt ``systemd`` service files are missing the following statement in these versions:
  21. .. code-block:: ini
  22. [Service]
  23. KillMode=process
  24. This statement must be added to successfully upgrade on these earlier versions
  25. of Salt.
  26. Changelog for v2015.5.9..v2015.5.10
  27. ===================================
  28. *Generated at: 2018-05-27 22:39:26 UTC*
  29. * 69ba1de71d Remove ability of authenticating user to specify pam service