First published: Tue Nov 03 2020(Updated: )
SaltStack has released a security update to Salt to address three critical vulnerabilities. We strongly recommend that you prioritize this update. This is a security release. The following CVE’s were fixed as part of this release:
Affected Software | Affected Version | How to fix |
---|---|---|
SaltStack | <3002<3001.1, 3001.2<3000.3, 3000.4<2019.2.5, 2019.2.6<2018.3.5<2017.7.4, 2017.7.8<2016.11.3, 2016.11.6, 2016.11.10<2016.3.4, 2016.3.6, 2016.3.8<2015.8.10, 2015.8.13<3002.x<3001.x<3000.x<2019.x | 3002 3001.1, 3001.2 3000.3, 3000.4 2019.2.5, 2019.2.6 2018.3.5 2017.7.4, 2017.7.8 2016.11.3, 2016.11.6, 2016.11.10 2016.3.4, 2016.3.6, 2016.3.8 2015.8.10, 2015.8.13 3002.x 3001.x 3000.x 2019.x |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The severity of saltproject-2020-11-02-advisory is critical due to multiple vulnerabilities addressed in the release.
To fix saltproject-2020-11-02-advisory, you need to update your Salt installation to the latest version specified in the advisory.
The affected versions of Salt include various releases from 2015.8.10 to 3002.
If you cannot immediately update for saltproject-2020-11-02-advisory, you should implement security measures to limit exposure and monitor systems closely.
Yes, there are known exploits associated with the vulnerabilities fixed in saltproject-2020-11-02-advisory.