First published: Wed Mar 03 2021(Updated: )
A Incorrect Implementation of Authentication Algorithm vulnerability in of SUSE SUSE Linux Enterprise Server 15 SP 3; openSUSE Tumbleweed allows local attackers to execute arbitrary code via salt without the need to specify valid credentials. This issue affects: SUSE SUSE Linux Enterprise Server 15 SP 3 salt versions prior to 3002.2-3. openSUSE Tumbleweed salt version 3002.2-2.1 and prior versions.
Credit: meissner@suse.de meissner@suse.de
Affected Software | Affected Version | How to fix |
---|---|---|
pip/salt | <3002.2 | 3002.2 |
SaltStack Salt | <3002.2 | |
openSUSE Tumbleweed | ||
SUSE SUSE Linux Enterprise Server | =15-sp3 | |
All of | ||
SaltStack Salt | <3002.2 | |
Any of | ||
openSUSE Tumbleweed | ||
SUSE SUSE Linux Enterprise Server | =15-sp3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-25315 is a vulnerability in SUSE Linux Enterprise Server 15 SP 3 and openSUSE Tumbleweed that allows local attackers to execute arbitrary code via salt without the need for valid credentials.
The severity of CVE-2021-25315 is critical, with a severity value of 7.8.
The affected software versions are SUSE Linux Enterprise Server 15 SP 3 salt versions prior to 3002.2 and SaltStack Salt.
To fix CVE-2021-25315, it is recommended to update to salt versions 3002.2 or later.
More information about CVE-2021-25315 can be found at the following URL: https://bugzilla.suse.com/show_bug.cgi?id=1182382