Salt 2015.8.x before 2015.8.4 does not properly handle clear messages on the minion, which allows man-in-the-middle attackers to execute arbitrary code by inserting packets into the minion-master data stream.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "2015.8.8+ds-1", "binary_name": "salt-api" }, { "binary_version": "2015.8.8+ds-1", "binary_name": "salt-cloud" }, { "binary_version": "2015.8.8+ds-1", "binary_name": "salt-common" }, { "binary_version": "2015.8.8+ds-1", "binary_name": "salt-doc" }, { "binary_version": "2015.8.8+ds-1", "binary_name": "salt-master" }, { "binary_version": "2015.8.8+ds-1", "binary_name": "salt-minion" }, { "binary_version": "2015.8.8+ds-1", "binary_name": "salt-proxy" }, { "binary_version": "2015.8.8+ds-1", "binary_name": "salt-ssh" }, { "binary_version": "2015.8.8+ds-1", "binary_name": "salt-syndic" } ] }