svn commit: r483113 - head/security/vuxml
Ben Woods
woodsb02 at FreeBSD.org
Sat Oct 27 08:06:04 UTC 2018
Author: woodsb02
Date: Sat Oct 27 08:06:03 2018
New Revision: 483113
URL: https://svnweb.freebsd.org/changeset/ports/483113
Log:
Add entry for sysutils/py-salt
PR: 232663
Reported by: Christer Edwards <christer.edwards at gmail.com>
Security: https://www.vuxml.org/freebsd/4f7c6af3-6a2c-4ead-8453-04e509688d45.html
Modified:
head/security/vuxml/vuln.xml
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Sat Oct 27 06:38:52 2018 (r483112)
+++ head/security/vuxml/vuln.xml Sat Oct 27 08:06:03 2018 (r483113)
@@ -58,6 +58,45 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="4f7c6af3-6a2c-4ead-8453-04e509688d45">
+ <topic>salt -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>py27-salt</name>
+ <name>py32-salt</name>
+ <name>py33-salt</name>
+ <name>py34-salt</name>
+ <name>py35-salt</name>
+ <name>py36-salt</name>
+ <name>py37-salt</name>
+ <range><lt>2017.7.8</lt></range>
+ <range><ge>2018.3.0</ge><lt>2018.3.3</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>SaltStack reports:</p>
+ <blockquote cite="https://docs.saltstack.com/en/latest/topics/releases/2018.3.3.html">
+ <p>Remote command execution and incorrect access control when using
+ salt-api.</p>
+ <p>Directory traversal vulnerability when using salt-api. Allows an
+ attacker to determine what files exist on a server when querying
+ /run or /events.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2018-15751</cvename>
+ <cvename>CVE-2018-15750</cvename>
+ <url>https://docs.saltstack.com/en/latest/topics/releases/2018.3.3.html</url>
+ <url>https://docs.saltstack.com/en/2017.7/topics/releases/2017.7.8.html</url>
+ </references>
+ <dates>
+ <discovery>2018-10-24</discovery>
+ <entry>2018-10-27</entry>
+ </dates>
+ </vuln>
+
<vuln vid="7c3a02b9-3273-4426-a0ba-f90fad2ff72e">
<topic>mozilla -- multiple vulnerabilities</topic>
<affects>
More information about the svn-ports-all
mailing list