USN-7181-1

Source
https://ubuntu.com/security/notices/USN-7181-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7181-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-7181-1
Related
Published
2025-01-06T13:09:46.470508Z
Modified
2025-01-06T13:09:46.470508Z
Summary
salt vulnerability
Details

It was discovered that Salt incorrectly handled web requests when the SSH client was enabled. An attacker could possibly use this issue to achieve remote code execution or obtain sensitive information.

References

Affected packages

Ubuntu:Pro:14.04:LTS / salt

Package

Name
salt
Purl
pkg:deb/ubuntu/salt@0.17.5+ds-1ubuntu0.1~esm4?arch=source&distro=esm-infra-legacy/trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.17.5+ds-1ubuntu0.1~esm4

Affected versions

0.*

0.16.0-1
0.16.4-2
0.17.1+dfsg-1
0.17.2-1
0.17.2-2
0.17.2-3
0.17.4-1
0.17.4-2
0.17.5-1
0.17.5+ds-1
0.17.5+ds-1ubuntu0.1~esm1
0.17.5+ds-1ubuntu0.1~esm2

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro with Legacy support add-on: https://ubuntu.com/pro",
    "binaries": [
        {
            "binary_version": "0.17.5+ds-1ubuntu0.1~esm4",
            "binary_name": "salt-common"
        },
        {
            "binary_version": "0.17.5+ds-1ubuntu0.1~esm4",
            "binary_name": "salt-doc"
        },
        {
            "binary_version": "0.17.5+ds-1ubuntu0.1~esm4",
            "binary_name": "salt-master"
        },
        {
            "binary_version": "0.17.5+ds-1ubuntu0.1~esm4",
            "binary_name": "salt-minion"
        },
        {
            "binary_version": "0.17.5+ds-1ubuntu0.1~esm4",
            "binary_name": "salt-ssh"
        },
        {
            "binary_version": "0.17.5+ds-1ubuntu0.1~esm4",
            "binary_name": "salt-syndic"
        }
    ]
}