First published: Wed Aug 26 2015(Updated: )
It was found that calling git.clone with https user/pass will leak the authentication details to the log. Upstream patch: <a href="https://github.com/saltstack/salt/commit/28aa9b105804ff433d8f663b2f9b804f2b75495a">https://github.com/saltstack/salt/commit/28aa9b105804ff433d8f663b2f9b804f2b75495a</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Saltstack Salt 2015 | <=5.4 | |
redhat/salt | <2015.5.5 | 2015.5.5 |
pip/salt | <2015.5.5 | 2015.5.5 |
debian/salt |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.