First published: Mon Jan 06 2025(Updated: )
It was discovered that Salt incorrectly handled web requests when the SSH client was enabled. An attacker could possibly use this issue to achieve remote code execution or obtain sensitive information.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/salt-common | <0.17.5+ds-1ubuntu0.1~esm4 | 0.17.5+ds-1ubuntu0.1~esm4 |
Ubuntu Linux | =14.04 | |
All of | ||
ubuntu/salt-master | <0.17.5+ds-1ubuntu0.1~esm4 | 0.17.5+ds-1ubuntu0.1~esm4 |
Ubuntu Linux | =14.04 | |
All of | ||
ubuntu/salt-minion | <0.17.5+ds-1ubuntu0.1~esm4 | 0.17.5+ds-1ubuntu0.1~esm4 |
Ubuntu Linux | =14.04 | |
All of | ||
ubuntu/salt-ssh | <0.17.5+ds-1ubuntu0.1~esm4 | 0.17.5+ds-1ubuntu0.1~esm4 |
Ubuntu Linux | =14.04 | |
All of | ||
ubuntu/salt-syndic | <0.17.5+ds-1ubuntu0.1~esm4 | 0.17.5+ds-1ubuntu0.1~esm4 |
Ubuntu Linux | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
USN-7181-1 is classified as a security vulnerability that can lead to remote code execution or exposure of sensitive information.
To fix USN-7181-1, update the affected packages to version 0.17.5+ds-1ubuntu0.1~esm4.
USN-7181-1 affects Ubuntu 14.04 with the specified Salt package versions.
USN-7181-1 impacts the Salt common, master, minion, ssh, and syndic packages.
The risks associated with USN-7181-1 include remote code execution and unauthorized access to sensitive information.