First published: Mon Oct 19 2015(Updated: )
A vulnerability in win_useradd, salt-cloud and Linode driver were found: * win_useradd returned data including the password of the newly created user * salt-cloud debug output contained win_password and sudo_password authentication credentials * Linode driver displayed authentication credentials in debug logs Upstream patch: <a href="https://github.com/twangboy/salt/commit/c0689e32154c41f59840ae10ffc5fbfa30618710">https://github.com/twangboy/salt/commit/c0689e32154c41f59840ae10ffc5fbfa30618710</a> External reference: <a href="https://docs.saltstack.com/en/latest/topics/releases/2015.8.1.html">https://docs.saltstack.com/en/latest/topics/releases/2015.8.1.html</a> <a href="https://docs.saltstack.com/en/latest/topics/releases/2015.5.6.html">https://docs.saltstack.com/en/latest/topics/releases/2015.5.6.html</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Saltstack Salt 2015 | =5.0 | |
Saltstack Salt 2015 | =5.1 | |
Saltstack Salt 2015 | =5.2 | |
Saltstack Salt 2015 | =5.3 | |
Saltstack Salt 2015 | =5.4 | |
Saltstack Salt 2015 | =5.5 | |
Saltstack Salt 2015 | =8.0 | |
redhat/salt | <2015.5.6 | 2015.5.6 |
redhat/salt | <2015.8.1 | 2015.8.1 |
pip/salt | >=2015.8<2015.8.1 | 2015.8.1 |
pip/salt | >=2015.5<2015.5.6 | 2015.5.6 |
debian/salt |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.