rpm package
suse/saltbundlepy-setuptools-scm&distro=SUSE:EL-9:Update:Products:SaltBundle:Update
pkg:rpm/suse/saltbundlepy-setuptools-scm&distro=SUSE:EL-9:Update:Products:SaltBundle:Update
Vulnerabilities (3)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2025-62349 | Med | 6.2 | < 8.2.0-1.11.1 | 8.2.0-1.11.1 | Jan 30, 2026 | Salt contains an authentication protocol version downgrade weakness that can allow a malicious minion to bypass newer authentication/security features by using an older request payload format, enabling minion impersonation and circumventing protections introduced in response to p | |
| CVE-2025-62348 | Hig | 7.8 | < 8.2.0-1.11.1 | 8.2.0-1.11.1 | Jan 30, 2026 | Salt's junos execution module contained an unsafe YAML decode/load usage. A specially crafted YAML payload processed by the junos module could lead to unintended code execution under the context of the Salt process. | |
| CVE-2023-34049 | Med | 6.7 | < 7.1.0-1.6.1 | 7.1.0-1.6.1 | Nov 14, 2024 | The Salt-SSH pre-flight option copies the script to the target at a predictable path, which allows an attacker to force Salt-SSH to run their script. If an attacker has access to the target VM and knows the path to the pre-flight script before it runs they can ensure Salt-SSH run |
- affected < 8.2.0-1.11.1fixed 8.2.0-1.11.1
Salt contains an authentication protocol version downgrade weakness that can allow a malicious minion to bypass newer authentication/security features by using an older request payload format, enabling minion impersonation and circumventing protections introduced in response to p
- affected < 8.2.0-1.11.1fixed 8.2.0-1.11.1
Salt's junos execution module contained an unsafe YAML decode/load usage. A specially crafted YAML payload processed by the junos module could lead to unintended code execution under the context of the Salt process.
- affected < 7.1.0-1.6.1fixed 7.1.0-1.6.1
The Salt-SSH pre-flight option copies the script to the target at a predictable path, which allows an attacker to force Salt-SSH to run their script. If an attacker has access to the target VM and knows the path to the pre-flight script before it runs they can ensure Salt-SSH run