All Projects → rossengeorgiev → Salt Security Backports

rossengeorgiev / Salt Security Backports

Salt security backports for CVE-2020-11651 & CVE-2020-11652

Programming Languages

python
139335 projects - #7 most used programming language

Labels

Projects that are alternatives of or similar to Salt Security Backports

Saltstack Mesos Test
Deploy a mesos docker cluster with saltstack
Stars: ✭ 11 (-89.91%)
Mutual labels:  saltstack
Cmdb
运维平台
Stars: ✭ 67 (-38.53%)
Mutual labels:  saltstack
Salt Winrepo Ng
Jinja templated winrepo
Stars: ✭ 80 (-26.61%)
Mutual labels:  saltstack
Saltshaker
How I use Salt
Stars: ✭ 29 (-73.39%)
Mutual labels:  saltstack
Salt Formula Linux
Stars: ✭ 57 (-47.71%)
Mutual labels:  saltstack
Salt States
My personal collection of salt states.
Stars: ✭ 67 (-38.53%)
Mutual labels:  saltstack
Fpco Salt Formula
Stars: ✭ 8 (-92.66%)
Mutual labels:  saltstack
Smcsystem
运维使用的主机与应用管理系统
Stars: ✭ 105 (-3.67%)
Mutual labels:  saltstack
Web develop
《Python Web开发实战》书中源码
Stars: ✭ 1,146 (+951.38%)
Mutual labels:  saltstack
Ec2 Autoscale Reactor
Autonomous Minion Management via EC2 Autoscaler
Stars: ✭ 78 (-28.44%)
Mutual labels:  saltstack
Saltconsul Examples
Setup an environment with Salt and Consul - ready for the cloud!
Stars: ✭ 30 (-72.48%)
Mutual labels:  saltstack
Jenkins Formula
Stars: ✭ 42 (-61.47%)
Mutual labels:  saltstack
Linux Salted
Stars: ✭ 68 (-37.61%)
Mutual labels:  saltstack
Ffho Salt Public
Salt-Orchestrated OpenSource based Software-Defined-Freifunk-Infrastructre-Network configuration :) Mirrored from https://git.ffho.net/FreifunkHochstift/ffho-salt-public
Stars: ✭ 12 (-88.99%)
Mutual labels:  saltstack
Mysql Formula
Install the MySQL client and/or server
Stars: ✭ 80 (-26.61%)
Mutual labels:  saltstack
Virtualenv Formula
Stars: ✭ 9 (-91.74%)
Mutual labels:  saltstack
Caasp Salt
A collection of salt states used to provision a kubernetes cluster
Stars: ✭ 67 (-38.53%)
Mutual labels:  saltstack
Salt Winrepo
Salt Windows Software Package Manager Repo
Stars: ✭ 105 (-3.67%)
Mutual labels:  saltstack
Psf Salt
PSF infrastructure configuration
Stars: ✭ 91 (-16.51%)
Mutual labels:  saltstack
Saltstackcheatsheet
SaltStack Cheat Sheet
Stars: ✭ 70 (-35.78%)
Mutual labels:  saltstack

Official patches for previous versions can be requested at: https://www.saltstack.com/lp/request-patch-april-2020/

⚠ Patches here are custom, and may differ from official ones ⚠

Backported security patches for unsupported salt versions

Build Status

Patches in this repo address the following CVEs:

Additionally include the following bugfixes:

Above fixed are included in latest release of SaltStack, specifically v2019.2.5 and v3000.3.

Check if your salt-master is vulnerable

Check script needs to be ran locally on your salt-master as root

python salt-cve-check.py

Example output for Salt 2017.7.8:

[+] Salt version: 2017.7.8
[ ] This version of salt is vulnerable! Check results below
[+] Checking salt-master (127.0.0.1:4506) status... ONLINE
[+] Checking if vulnerable to CVE-2020-11651... YES
[+] Checking if vulnerable to CVE-2020-11652 (read_token)... YES
[+] Checking if vulnerable to CVE-2020-11652 (read)... YES
[+] Checking if vulnerable to CVE-2020-11652 (write1)... YES
[+] Checking if vulnerable to CVE-2020-11652 (write2)... YES

Applying the patches

# locate the salt package directory (use python3 if necessary)

python -c "import imp; print(imp.find_module('salt')[1])"

# in my case: /usr/lib/python2.7/dist-packages/salt
# apply patches
# (adding -b flag will backup file before modifications at same path with .orig suffix)
# (patch can be reversed running the same command with -R flag)

patch -p2 -d /usr/lib/python2.7/dist-packages/salt < 2017.7.8_CVE-2020-11651.patch
patch -p2 -d /usr/lib/python2.7/dist-packages/salt < 2017.7.8_CVE-2020-11652.patch

# restart salt-master

systemctl restart salt-master
# or
service salt-master restart

Rerun the check script:

[email protected] # python salt-cve-check.py
[+] Salt version: 2017.7.8
[ ] This version of salt is vulnerable! Check results below
[+] Checking salt-master (127.0.0.1:4506) status... ONLINE
[+] Checking if vulnerable to CVE-2020-11651... NO
[+] Checking if vulnerable to CVE-2020-11652 (read_token)... NO
[+] Checking if vulnerable to CVE-2020-11652 (read)... NO
[+] Checking if vulnerable to CVE-2020-11652 (write1)... NO
[+] Checking if vulnerable to CVE-2020-11652 (write2)... NO
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].