First published: Mon Oct 19 2015(Updated: )
A vulnerability in win_useradd, salt-cloud and Linode driver were found: * win_useradd returned data including the password of the newly created user * salt-cloud debug output contained win_password and sudo_password authentication credentials * Linode driver displayed authentication credentials in debug logs Upstream patch: <a href="https://github.com/twangboy/salt/commit/c0689e32154c41f59840ae10ffc5fbfa30618710">https://github.com/twangboy/salt/commit/c0689e32154c41f59840ae10ffc5fbfa30618710</a> External reference: <a href="https://docs.saltstack.com/en/latest/topics/releases/2015.8.1.html">https://docs.saltstack.com/en/latest/topics/releases/2015.8.1.html</a> <a href="https://docs.saltstack.com/en/latest/topics/releases/2015.5.6.html">https://docs.saltstack.com/en/latest/topics/releases/2015.5.6.html</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Saltstack Salt 2015 | =5.0 | |
Saltstack Salt 2015 | =5.1 | |
Saltstack Salt 2015 | =5.2 | |
Saltstack Salt 2015 | =5.3 | |
Saltstack Salt 2015 | =5.4 | |
Saltstack Salt 2015 | =5.5 | |
Saltstack Salt 2015 | =8.0 | |
redhat/salt | <2015.5.6 | 2015.5.6 |
redhat/salt | <2015.8.1 | 2015.8.1 |
pip/salt | >=2015.8<2015.8.1 | 2015.8.1 |
pip/salt | >=2015.5<2015.5.6 | 2015.5.6 |
debian/salt |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-6941 is considered a high-severity vulnerability due to the exposure of sensitive user credentials.
To fix CVE-2015-6941, upgrade to the patched versions 2015.5.6 or 2015.8.1 of Salt or later.
CVE-2015-6941 affects Salt versions from 5.0 to 5.5 and also 8.0.
CVE-2015-6941 exposes sensitive data such as the passwords of newly created users and authentication credentials.
Yes, using package managers like pip or Red Hat's package manager is recommended to obtain the fixes for CVE-2015-6941.