Several vulnerabilities were discovered in salt, a powerful remote execution manager. The flaws could result in authentication bypass and invocation of Salt SSH, creation of certificates with weak file permissions via the TLS execution module or shell injections with the Salt API using the SSH client. For the stable distribution (buster), these problems have been fixed in version 2018.3.4+dfsg1-6+deb10u2. We recommend that you upgrade your salt packages. For the detailed security status of salt please refer to its security tracker page at: https://security-tracker.debian.org/tracker/salt
Several vulnerabilities were discovered in salt, a powerful remote execution manager. The flaws could result in authentication bypass and invocation of Salt SSH, creation of certificates with weak file permissions via the TLS execution module or shell injections with the Salt API using the SSH client.
For the stable distribution (buster), these problems have been fixed in version 2018.3.4+dfsg1-6+deb10u2.
We recommend that you upgrade your salt packages.
For the detailed security status of salt please refer to its security tracker page at: https://security-tracker.debian.org/tracker/salt