Salt 2015.8.x before 2015.8.4 does not properly handle clear messages on the minion, which allows man-in-the-middle attackers to execute arbitrary code by inserting packets into the minion-master data stream.
{ "binaries": [ { "binary_name": "salt-common", "binary_version": "0.17.5+ds-1ubuntu0.1~esm4" }, { "binary_name": "salt-master", "binary_version": "0.17.5+ds-1ubuntu0.1~esm4" }, { "binary_name": "salt-minion", "binary_version": "0.17.5+ds-1ubuntu0.1~esm4" }, { "binary_name": "salt-ssh", "binary_version": "0.17.5+ds-1ubuntu0.1~esm4" }, { "binary_name": "salt-syndic", "binary_version": "0.17.5+ds-1ubuntu0.1~esm4" } ] }