A UNIX Symbolic Link (Symlink) Following vulnerability in the packaging of salt in some implementations of Linux servers allows local attackers to escalate privileges from user salt to root.
Created salt tracking bugs for this issue: Affects: epel-all [bug 1810992] Affects: fedora-all [bug 1810991]
External Reference: https://bugzilla.suse.com/show_bug.cgi?id=1157465
Statement: Privilege escalation is due to no symlink validation check in %post script for "salt-master" where file ownership is changed to salt user. salt-master was used by Red Hat Storage Console 2 which has reached End Of Life. Red Hat Ceph Storage 2 does not use salt-master, in addition affected code is not included in the %post script for the version of salt shipped by Red Hat.