Opened 4 years ago
Closed 4 years ago
#60527 closed update (fixed)
salt: critical remote execution vulnerability CVE-2020-11651
Reported by: | aphor (Jeremy McMillan) | Owned by: | aphor (Jeremy McMillan) |
---|---|---|---|
Priority: | Normal | Milestone: | |
Component: | ports | Version: | |
Keywords: | Cc: | ||
Port: | salt |
Description
https://nvd.nist.gov/vuln/detail/CVE-2020-11651
Anonymous Internet attackers can remote execute arbitrary code on all infrastructure controlled by a vulnerable salt master.
Salt release 3000.3 is available at the time this ticket was created.
Change History (3)
comment:1 Changed 4 years ago by mf2k (Frank Schima)
Priority: | High → Normal |
---|---|
Type: | defect → update |
comment:2 Changed 4 years ago by mf2k (Frank Schima)
Owner: | set to aphor |
---|---|
Status: | new → assigned |
You are the listed maintainer for this port.
comment:3 Changed 4 years ago by ryandesign (Ryan Carsten Schmidt)
Resolution: | → fixed |
---|---|
Status: | assigned → closed |
You updated the port in [c9275a41dc5b88655280ba5fe5f733fe0568181d/macports-ports].
In the future, please use the ticket URL and one of the known keywords in the commit message so that Trac can auto-close the ticket, for example:
Closes: https://trac.macports.org/ticket/60527
Note: See
TracTickets for help on using
tickets.
The Priority field is for use by Macports team members only, please do not change it.