First published: Tue Apr 12 2016(Updated: )
Salt 2015.8.x before 2015.8.4 does not properly handle clear messages on the minion, which allows man-in-the-middle attackers to execute arbitrary code by inserting packets into the minion-master data stream.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SaltStack Salt | =2015.8.0 | |
SaltStack Salt | =2015.8.1 | |
SaltStack Salt | =2015.8.2 | |
SaltStack Salt | =2015.8.3 | |
openSUSE Leap | =42.1 | |
pip/salt | >=2015.8.0rc1<2015.8.4 | 2015.8.4 |
=2015.8.0 | ||
=2015.8.1 | ||
=2015.8.2 | ||
=2015.8.3 | ||
=42.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.