First published: Tue Dec 03 2019(Updated: )
SaltStack RSA Key Generation allows remote users to decrypt communications
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Saltstack Saltstack | >=0.14.0<=0.15.0 | |
pip/salt | <0.15.1 | 0.15.1 |
debian/salt |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-2228 is a vulnerability in SaltStack RSA Key Generation that allows remote users to decrypt communications.
The SaltStack software versions between 0.14.0 and 0.15.0 are affected by CVE-2013-2228. Additionally, the Debian package versions 2018.3.4+dfsg1-6+deb10u3, 3002.6+dfsg1-4+deb11u1, and 3004.1+dfsg-2.2 are also affected.
CVE-2013-2228 has a severity score of 8.1, which is considered high.
To fix the CVE-2013-2228 vulnerability, you should update SaltStack to a version that is not affected (above 0.15.0) and update the Debian package to a version that provides a fix (above 3004.1+dfsg-2.2).
You can find more information about CVE-2013-2228 at the following references: [Link 1](https://github.com/saltstack/salt/commit/e8ce66cf688b43aeb3e716e78b1af3a08e9940e3), [Link 2](https://security-tracker.debian.org/tracker/CVE-2013-2228), [Link 3](http://www.openwall.com/lists/oss-security/2013/07/01/1).