|Description||In SaltStack Salt before 2016.3.6, compromised salt-minions can impersonate the salt-master.|
|Source||CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)|
Vulnerable and fixed packages
The table below lists information on source packages.
|salt (PTS)||buster, buster (security)||2018.3.4+dfsg1-6+deb10u3||fixed|
|bullseye (security), bullseye||3002.6+dfsg1-4+deb11u1||fixed|
The information below is based on the following data on fixed versions.
|Package||Type||Release||Fixed Version||Urgency||Origin||Debian Bugs|
[stretch] - salt <no-dsa> (Minor issue)
[jessie] - salt <ignored> (Vulnerable code introduced later, but older versions did not verify master anyways)
The behaviour though was back off by default in a later commit again
The fix is the second part of the #40159 PR, but the behaviour is turned
off by default and needs considerations of admins before enabling. We still
consider the issue as fixed starting with this change. Details in