svn commit: r407963 - head/security/vuxml
Mark Felder
feld at FreeBSD.org
Wed Feb 3 17:16:59 UTC 2016
Author: feld
Date: Wed Feb 3 17:16:57 2016
New Revision: 407963
URL: https://svnweb.freebsd.org/changeset/ports/407963
Log:
Document py-salt vulnerability
Security: CVE-2016-1866
Modified:
head/security/vuxml/vuln.xml
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Wed Feb 3 16:36:14 2016 (r407962)
+++ head/security/vuxml/vuln.xml Wed Feb 3 17:16:57 2016 (r407963)
@@ -58,6 +58,38 @@ Notes:
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="0652005e-ca96-11e5-96d6-14dae9d210b8">
+ <topic>salt -- code execution</topic>
+ <affects>
+ <package>
+ <name>py27-salt</name>
+ <name>py32-salt</name>
+ <name>py33-salt</name>
+ <name>py34-salt</name>
+ <name>py35-salt</name>
+ <range><ge>2015.8.0</ge><lt>2015.8.4</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>SaltStack reports:</p>
+ <blockquote cite="https://docs.saltstack.com/en/latest/topics/releases/2015.8.4.html">
+ <p>Improper handling of clear messages on the minion, which
+ could result in executing commands not sent by the master.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://docs.saltstack.com/en/latest/topics/releases/2015.8.4.html</url>
+ <url>https://github.com/saltstack/salt/pull/30613/files</url>
+ <cvename>CVE-2016-1866</cvename>
+ </references>
+ <dates>
+ <discovery>2016-01-25</discovery>
+ <entry>2016-02-03</entry>
+ </dates>
+ </vuln>
+
<vuln vid="bb0ef21d-0e1b-461b-bc3d-9cba39948888">
<topic>rails -- multiple vulnerabilities</topic>
<affects>
More information about the svn-ports-all
mailing list