Versions Packages Information History CVEs Related Badges Report

Versions for salt

373 package(s) known

Repository Package name Version Category Maintainer(s)
AIX Toolbox salt 3004.2 Potentially vulnerable System Environment/Daemons -
Alpine Linux 3.8
community
salt-ssh 2018.3.3 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.8
community
salt-syndic 2018.3.3 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.8
community
salt-doc 2018.3.3 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.8
community
salt 2018.3.3 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.8
community
salt-api 2018.3.3 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.8
community
salt-minion 2018.3.3 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.8
community
salt-cloud 2018.3.3 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.8
community
salt-master 2018.3.3 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.9
community
salt-ssh 2018.3.3 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.9
community
salt-api 2018.3.3 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.9
community
salt-minion 2018.3.3 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.9
community
salt-doc 2018.3.3 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.9
community
salt 2018.3.3 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.9
community
salt-cloud 2018.3.3 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.9
community
salt-syndic 2018.3.3 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.9
community
salt-master 2018.3.3 Potentially vulnerable - fallback-mnt-alpine@repology
Alpine Linux 3.10
community
salt-api 2019.2.4 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.10
community
salt-syndic-openrc 2019.2.4 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.10
community
salt-minion-openrc 2019.2.4 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.10
community
salt 2019.2.4 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.10
community
salt-cloud 2019.2.4 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.10
community
salt-minion 2019.2.4 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.10
community
salt-ssh 2019.2.4 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.10
community
salt-master 2019.2.4 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.10
community
salt-doc 2019.2.4 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.10
community
salt-syndic 2019.2.4 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.10
community
salt-api-openrc 2019.2.4 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.10
community
salt-master-openrc 2019.2.4 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.11
community
salt-master-openrc 2019.2.4 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.11
community
salt-doc 2019.2.4 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.11
community
salt-minion 2019.2.4 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.11
community
salt-minion-openrc 2019.2.4 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.11
community
salt-syndic-openrc 2019.2.4 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.11
community
salt-api 2019.2.4 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.11
community
salt 2019.2.4 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.11
community
salt-cloud 2019.2.4 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.11
community
salt-master 2019.2.4 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.11
community
salt-ssh 2019.2.4 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.11
community
salt-api-openrc 2019.2.4 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.11
community
salt-syndic 2019.2.4 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.12
community
salt-minion 3001.6 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.12
community
salt-api 3001.6 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.12
community
salt-cloud 3001.6 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.12
community
salt-api-openrc 3001.6 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.12
community
salt-syndic 3001.6 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.12
community
salt-master 3001.6 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.12
community
salt-minion-openrc 3001.6 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.12
community
salt-ssh 3001.6 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.12
community
salt 3001.6 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.12
community
salt-master-openrc 3001.6 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.12
community
salt-doc 3001.6 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.12
community
salt-syndic-openrc 3001.6 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.13
community
salt-master-openrc 3003 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.13
community
salt-syndic-openrc 3003 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.13
community
salt-api 3003 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.13
community
salt-minion 3003 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.13
community
salt-ssh 3003 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.13
community
salt-cloud 3003 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.13
community
salt-master 3003 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.13
community
salt-minion-openrc 3003 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.13
community
salt-doc 3003 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.13
community
salt-api-openrc 3003 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.13
community
salt-syndic 3003 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.13
community
salt 3003 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.14
community
salt-master 3003.3 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.14
community
salt-master-openrc 3003.3 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.14
community
salt-api-openrc 3003.3 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.14
community
salt-minion 3003.3 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.14
community
salt-cloud 3003.3 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.14
community
salt-syndic 3003.3 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.14
community
salt 3003.3 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.14
community
salt-ssh 3003.3 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.14
community
salt-minion-openrc 3003.3 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.14
community
salt-syndic-openrc 3003.3 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.14
community
salt-api 3003.3 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.14
community
salt-doc 3003.3 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.15
community
salt-api 3004 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.15
community
salt-master-openrc 3004 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.15
community
salt-api-openrc 3004 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.15
community
salt-syndic 3004 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.15
community
salt 3004 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.15
community
salt-cloud 3004 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.15
community
salt-ssh 3004 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.15
community
salt-doc 3004 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.15
community
salt-minion 3004 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.15
community
salt-minion-openrc 3004 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.15
community
salt-master 3004 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.15
community
salt-syndic-openrc 3004 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.16
community
salt-cloud 3004.2 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.16
community
salt-api 3004.2 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.16
community
salt-doc 3004.2 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.16
community
salt-master-openrc 3004.2 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.16
community
salt-master 3004.2 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.16
community
salt-syndic-openrc 3004.2 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.16
community
salt-minion 3004.2 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.16
community
salt-minion-openrc 3004.2 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.16
community
salt-ssh 3004.2 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.16
community
salt 3004.2 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.16
community
salt-api-openrc 3004.2 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.16
community
salt-syndic 3004.2 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.17
community
salt-syndic-openrc 3005.1 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.17
community
salt-ssh 3005.1 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.17
community
salt-master 3005.1 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.17
community
salt-cloud 3005.1 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.17
community
salt-minion-openrc 3005.1 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.17
community
salt-doc 3005.1 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.17
community
salt-master-openrc 3005.1 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.17
community
salt-minion 3005.1 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.17
community
salt-api 3005.1 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.17
community
salt 3005.1 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.17
community
salt-api-openrc 3005.1 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.17
community
salt-syndic 3005.1 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.18
community
salt 3006.1 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.18
community
salt-api 3006.1 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.18
community
salt-api-openrc 3006.1 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.18
community
salt-doc 3006.1 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.18
community
salt-master 3006.1 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.18
community
salt-master-openrc 3006.1 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.18
community
salt-minion 3006.1 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.18
community
salt-minion-openrc 3006.1 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.18
community
salt-pyc 3006.1 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.18
community
salt-syndic 3006.1 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux 3.18
community
salt-syndic-openrc 3006.1 Potentially vulnerable - kdaudt@alpinelinux.org
Alpine Linux Edge
community
salt 3006.4 - kdaudt@alpinelinux.org
Alpine Linux Edge
community
salt-api 3006.4 - kdaudt@alpinelinux.org
Alpine Linux Edge
community
salt-api-openrc 3006.4 - kdaudt@alpinelinux.org
Alpine Linux Edge
community
salt-doc 3006.4 - kdaudt@alpinelinux.org
Alpine Linux Edge
community
salt-master 3006.4 - kdaudt@alpinelinux.org
Alpine Linux Edge
community
salt-master-openrc 3006.4 - kdaudt@alpinelinux.org
Alpine Linux Edge
community
salt-minion 3006.4 - kdaudt@alpinelinux.org
Alpine Linux Edge
community
salt-minion-openrc 3006.4 - kdaudt@alpinelinux.org
Alpine Linux Edge
community
salt-pyc 3006.4 - kdaudt@alpinelinux.org
Alpine Linux Edge
community
salt-syndic 3006.4 - kdaudt@alpinelinux.org
Alpine Linux Edge
community
salt-syndic-openrc 3006.4 - kdaudt@alpinelinux.org
ALT Linux p9 salt 3004 Potentially vulnerable System/Configuration/Other cas@altlinux.org
ALT Linux p10 salt 3006.3 System/Configuration/Other cas@altlinux.org
ALT Sisyphus salt 3006.4 System/Configuration/Other cas@altlinux.org
Arch
extra
salt 3006.1 Potentially vulnerable - -
Arch Linux 32 i486
extra
salt 3005.1 Potentially vulnerable - -
Arch Linux 32 i686
extra
salt 3005.1 Potentially vulnerable - -
Arch Linux 32 pentium4
extra
salt 3005.1 Potentially vulnerable - -
Arch Linux ARM aarch64
extra
salt 3006.1 Potentially vulnerable - -
Arch Linux ARM aarch64
community
salt 3006.1 Potentially vulnerable - -
AUR salt-git 3002.4.r1541.gac4ecad325 - fallback-mnt-aur@repology
Artix
world
salt 3006.1 Potentially vulnerable - -
Chocolatey Salt Minion (Install) 3005.1.1 Potentially vulnerable - -
Chocolatey salt-minion (Install) 3000.1.0 Potentially vulnerable - -
Debian 10
buster/main
salt 2018.3.4 Potentially vulnerable admin pkg-salt-team@lists.alioth.debian.org, benjamin.drung@cloud.ionos.com, franklin.g.mendoza@gmail.com, joehealy@gmail.com, jolly_roger@itblog.org.ua, onovy@debian.org
Debian 10
buster/updates/main
salt 2018.3.4 Potentially vulnerable admin pkg-salt-team@lists.alioth.debian.org, benjamin.drung@cloud.ionos.com, franklin.g.mendoza@gmail.com, joehealy@gmail.com, jolly_roger@itblog.org.ua, onovy@debian.org
Debian 11
bullseye-security/main
salt 3002.6 Potentially vulnerable admin pkg-salt-team@alioth-lists.debian.net, benjamin.drung@ionos.com, franklin.g.mendoza@gmail.com, joehealy@gmail.com, jolly_roger@itblog.org.ua, onovy@debian.org
Debian 11
bullseye/main
salt 3002.6 Potentially vulnerable admin pkg-salt-team@alioth-lists.debian.net, benjamin.drung@ionos.com, franklin.g.mendoza@gmail.com, joehealy@gmail.com, jolly_roger@itblog.org.ua, onovy@debian.org
Debian Unstable
sid/main
salt 3004.1 Potentially vulnerable admin pkg-salt-team@alioth-lists.debian.net, bdrung@debian.org, franklin.g.mendoza@gmail.com, joehealy@gmail.com, jolly_roger@itblog.org.ua, onovy@debian.org
Debian Unstable
sid/main
salt 3004.1 Potentially vulnerable admin pkg-salt-team@alioth-lists.debian.net, bdrung@debian.org, franklin.g.mendoza@gmail.com, joehealy@gmail.com, jolly_roger@itblog.org.ua, onovy@debian.org
Deepin
main
salt 2018.3.4.1 Potentially vulnerable - pkg-salt-team@lists.alioth.debian.org, benjamin.drung@cloud.ionos.com, franklin.g.mendoza@gmail.com, joehealy@gmail.com, jolly_roger@itblog.org.ua, onovy@debian.org
Devuan 3.0
beowulf/main
salt 2018.3.4 Potentially vulnerable admin pkg-salt-team@lists.alioth.debian.org, benjamin.drung@cloud.ionos.com, franklin.g.mendoza@gmail.com, joehealy@gmail.com, jolly_roger@itblog.org.ua, onovy@debian.org
Devuan 4.0
chimaera/main
salt 3002.6 Potentially vulnerable admin pkg-salt-team@alioth-lists.debian.net, benjamin.drung@ionos.com, franklin.g.mendoza@gmail.com, joehealy@gmail.com, jolly_roger@itblog.org.ua, onovy@debian.org
Devuan Unstable
unstable/main
salt 3004.1 Potentially vulnerable admin pkg-salt-team@alioth-lists.debian.net, bdrung@debian.org, franklin.g.mendoza@gmail.com, joehealy@gmail.com, jolly_roger@itblog.org.ua, onovy@debian.org
EPEL 6 salt-api 0.8.2 Potentially vulnerable System Environment/Daemons -
EPEL 9 salt 3005.4 System Environment/Daemons -
Fedora 26
updates
salt 2017.7.3 Potentially vulnerable System Environment/Daemons -
Fedora 26
release
salt 2016.11.5 Potentially vulnerable System Environment/Daemons -
Fedora 26
release
salt-api 0.8.3 Potentially vulnerable System Environment/Daemons -
Fedora 27
updates
salt 2018.3.2 Potentially vulnerable System Environment/Daemons -
Fedora 27
release
salt 2017.7.1 Potentially vulnerable System Environment/Daemons -
Fedora 28
updates
salt 2019.2.0 Potentially vulnerable Unspecified -
Fedora 28
release
salt 2018.3.0 Potentially vulnerable System Environment/Daemons -
Fedora 29
updates
salt 2019.2.0 Potentially vulnerable Unspecified -
Fedora 29
release
salt 2018.3.2 Potentially vulnerable System Environment/Daemons -
Fedora 30
updates
salt 3000.2 Potentially vulnerable System Environment/Daemons -
Fedora 30
release
salt 2019.2.0 Potentially vulnerable Unspecified -
Fedora 31
updates
salt 3001.3 Potentially vulnerable System Environment/Daemons -
Fedora 31
release
salt 2019.2.1rc0 Potentially vulnerable Unspecified -
Fedora 32
updates
salt 3001.7 Potentially vulnerable System Environment/Daemons -
Fedora 32
release
salt 3000.1 Potentially vulnerable System Environment/Daemons -
Fedora 33
updates
salt 3003.3 Potentially vulnerable System Environment/Daemons -
Fedora 33
release
salt 3001.1 Potentially vulnerable System Environment/Daemons -
Fedora 34
updates
salt 3004.1 Potentially vulnerable System Environment/Daemons -
Fedora 34
release
salt 3002.6 Potentially vulnerable System Environment/Daemons -
Fedora 35
updates
salt 3005.1 Potentially vulnerable System Environment/Daemons -
Fedora 35
release
salt 3003.3 Potentially vulnerable System Environment/Daemons -
Fedora 36
updates
salt 3005.1 Potentially vulnerable System Environment/Daemons -
Fedora 36
release
salt 3004.1 Potentially vulnerable System Environment/Daemons -
Fedora 37
updates
salt 3005.4 System Environment/Daemons -
Fedora 37
release
salt 3005 Potentially vulnerable System Environment/Daemons -
Fedora 38
updates
salt 3006.4 System Environment/Daemons -
Fedora 38
release
salt 3005.1 Potentially vulnerable System Environment/Daemons -
Fedora 39
updates
salt 3006.4 System Environment/Daemons -
Fedora 39
development
salt 3006.3 System Environment/Daemons -
Fedora Rawhide
development
salt 3006.4 System Environment/Daemons -
FreeBSD Ports sysutils/py-salt 3006.4 sysutils krion@freebsd.org
Gentoo app-admin/salt 3006.4 app-admin chutzpah@gentoo.org
Gentoo app-admin/salt 3006.3 app-admin chutzpah@gentoo.org
Gentoo app-admin/salt 3006.2 app-admin chutzpah@gentoo.org
Gentoo app-admin/salt 3005.4 app-admin chutzpah@gentoo.org
Gentoo app-admin/salt 3005.3 app-admin chutzpah@gentoo.org
Gentoo app-admin/salt 3005.1 Potentially vulnerable app-admin chutzpah@gentoo.org
Homebrew salt HEAD - -
Homebrew salt 3005 Potentially vulnerable - -
LiGurOS stable app-admin/salt 3006.2 app-admin chutzpah@gentoo.org
LiGurOS stable app-admin/salt 3005.2 app-admin chutzpah@gentoo.org
LiGurOS stable app-admin/salt 3005.1 Potentially vulnerable app-admin chutzpah@gentoo.org
LiGurOS develop app-admin/salt 3006.4 app-admin chutzpah@gentoo.org
LiGurOS develop app-admin/salt 3006.3 app-admin chutzpah@gentoo.org
LiGurOS develop app-admin/salt 3006.2 app-admin chutzpah@gentoo.org
LiGurOS develop app-admin/salt 3005.4 app-admin chutzpah@gentoo.org
LiGurOS develop app-admin/salt 3005.3 app-admin chutzpah@gentoo.org
LiGurOS develop app-admin/salt 3005.1 Potentially vulnerable app-admin chutzpah@gentoo.org
MacPorts salt 3000.3 Potentially vulnerable sysutils aphor@github
Manjaro Stable
extra
salt 3006.1 Potentially vulnerable - -
Manjaro Testing
extra
salt 3006.1 Potentially vulnerable - -
Manjaro Unstable
extra
salt 3006.1 Potentially vulnerable - -
nixpkgs stable 21.11 salt 3003.4 Potentially vulnerable - flakebi@t-online.de
nixpkgs stable 22.05 salt 3004.2 Potentially vulnerable - flakebi@t-online.de
nixpkgs stable 22.11 salt 3005.1 Potentially vulnerable - flakebi@t-online.de
nixpkgs stable 23.05 salt 3006.4 - flakebi@t-online.de
nixpkgs unstable salt 3006.4 - flakebi@t-online.de
OpenBSD Ports sysutils/salt 3006.4 sysutils robert@openbsd.org
OpenIndiana packages
hipster
salt 3006.4 System/Administration and Configuration -
OpenIndiana packages
hipster
salt 3006.3 System/Administration and Configuration -
OpenPKG salt 2017.7.0 Potentially vulnerable SCM -
openSUSE Leap 42.3
updates/oss
salt 2018.3.0 Potentially vulnerable System/Management -
openSUSE Leap 42.3
updates/oss
salt 2018.3.0 Potentially vulnerable System/Management -
openSUSE Leap 42.3
updates/oss
salt 2018.3.0 Potentially vulnerable System/Management -
openSUSE Leap 42.3
updates/oss
salt 2018.3.0 Potentially vulnerable System/Management -
openSUSE Leap 42.3
updates/oss
salt 2018.3.0 Potentially vulnerable System/Management -
openSUSE Leap 42.3
updates/oss
salt 2017.7.2 Potentially vulnerable System/Management -
openSUSE Leap 42.3
updates/oss
salt 2017.7.1 Potentially vulnerable System/Management -
openSUSE Leap 42.3
updates/oss
salt 2016.11.4 Potentially vulnerable System/Management -
openSUSE Leap 42.3
main/oss
salt 2016.3.4 Potentially vulnerable System/Monitoring -
openSUSE Leap 15.0
updates/sle
salt 3004 Potentially vulnerable System/Management -
openSUSE Leap 15.0
updates/sle
salt 3004 Potentially vulnerable System/Management -
openSUSE Leap 15.0
updates/sle
salt 3004 Potentially vulnerable System/Management -
openSUSE Leap 15.0
updates/sle
salt 3004 Potentially vulnerable System/Management -
openSUSE Leap 15.0
updates/sle
salt 3004 Potentially vulnerable System/Management -
openSUSE Leap 15.0
updates/sle
salt 3002.2 Potentially vulnerable System/Management -
openSUSE Leap 15.0
updates/sle
salt 3002.2 Potentially vulnerable System/Management -
openSUSE Leap 15.0
updates/sle
salt 3002.2 Potentially vulnerable System/Management -
openSUSE Leap 15.0
updates/sle
salt 3002.2 Potentially vulnerable System/Management -
openSUSE Leap 15.0
updates/sle
salt 3002.2 Potentially vulnerable System/Management -
openSUSE Leap 15.0
updates/sle
salt 3002.2 Potentially vulnerable System/Management -
openSUSE Leap 15.0
updates/sle
salt 3002.2 Potentially vulnerable System/Management -
openSUSE Leap 15.0
updates/sle
salt 3002.2 Potentially vulnerable System/Management -
openSUSE Leap 15.0
updates/oss
salt 2019.2.0 Potentially vulnerable System/Management -
openSUSE Leap 15.0
updates/oss
salt 2019.2.0 Potentially vulnerable System/Management -
openSUSE Leap 15.0
updates/oss
salt 2019.2.0 Potentially vulnerable System/Management -
openSUSE Leap 15.0
updates/oss
salt 2019.2.0 Potentially vulnerable System/Management -
openSUSE Leap 15.0
main/oss
salt 2018.3.0 Potentially vulnerable System/Management -
openSUSE Leap 15.0
updates/oss
salt 2018.3.0 Potentially vulnerable System/Management -
openSUSE Leap 15.0
updates/oss
salt 2018.3.0 Potentially vulnerable System/Management -
openSUSE Leap 15.1
updates/sle
salt 3004 Potentially vulnerable System/Management -
openSUSE Leap 15.1
updates/sle
salt 3004 Potentially vulnerable System/Management -
openSUSE Leap 15.1
updates/sle
salt 3004 Potentially vulnerable System/Management -
openSUSE Leap 15.1
updates/sle
salt 3004 Potentially vulnerable System/Management -
openSUSE Leap 15.1
updates/sle
salt 3004 Potentially vulnerable System/Management -
openSUSE Leap 15.1
updates/sle
salt 3002.2 Potentially vulnerable System/Management -
openSUSE Leap 15.1
updates/sle
salt 3002.2 Potentially vulnerable System/Management -
openSUSE Leap 15.1
updates/sle
salt 3002.2 Potentially vulnerable System/Management -
openSUSE Leap 15.1
updates/sle
salt 3002.2 Potentially vulnerable System/Management -
openSUSE Leap 15.1
updates/sle
salt 3002.2 Potentially vulnerable System/Management -
openSUSE Leap 15.1
updates/sle
salt 3002.2 Potentially vulnerable System/Management -
openSUSE Leap 15.1
updates/sle
salt 3002.2 Potentially vulnerable System/Management -
openSUSE Leap 15.1
updates/sle
salt 3002.2 Potentially vulnerable System/Management -
openSUSE Leap 15.1
updates/oss
salt 3000 Potentially vulnerable System/Management -
openSUSE Leap 15.1
updates/oss
salt 3000 Potentially vulnerable System/Management -
openSUSE Leap 15.1
updates/oss
salt 3000 Potentially vulnerable System/Management -
openSUSE Leap 15.1
updates/oss
salt 3000 Potentially vulnerable System/Management -
openSUSE Leap 15.1
updates/oss
salt 3000 Potentially vulnerable System/Management -
openSUSE Leap 15.1
main/oss
salt 2019.2.0 Potentially vulnerable System/Management -
openSUSE Leap 15.1
updates/oss
salt 2019.2.0 Potentially vulnerable System/Management -
openSUSE Leap 15.1
updates/oss
salt 2019.2.0 Potentially vulnerable System/Management -
openSUSE Leap 15.1
updates/oss
salt 2019.2.0 Potentially vulnerable System/Management -
openSUSE Leap 15.1
updates/oss
salt 2019.2.0 Potentially vulnerable System/Management -
openSUSE Leap 15.1
updates/oss
salt 2019.2.0 Potentially vulnerable System/Management -
openSUSE Leap 15.1
updates/oss
salt 2019.2.0 Potentially vulnerable System/Management -
openSUSE Leap 15.2
updates/sle
salt 3004 Potentially vulnerable System/Management -
openSUSE Leap 15.2
updates/sle
salt 3004 Potentially vulnerable System/Management -
openSUSE Leap 15.2
updates/sle
salt 3004 Potentially vulnerable System/Management -
openSUSE Leap 15.2
updates/sle
salt 3004 Potentially vulnerable System/Management -
openSUSE Leap 15.2
updates/sle
salt 3004 Potentially vulnerable System/Management -
openSUSE Leap 15.2
updates/oss
salt 3002.2 Potentially vulnerable System/Management -
openSUSE Leap 15.2
updates/oss
salt 3002.2 Potentially vulnerable System/Management -
openSUSE Leap 15.2
updates/oss
salt 3002.2 Potentially vulnerable System/Management -
openSUSE Leap 15.2
updates/oss
salt 3002.2 Potentially vulnerable System/Management -
openSUSE Leap 15.2
updates/oss
salt 3002.2 Potentially vulnerable System/Management -
openSUSE Leap 15.2
updates/sle
salt 3002.2 Potentially vulnerable System/Management -
openSUSE Leap 15.2
updates/sle
salt 3002.2 Potentially vulnerable System/Management -
openSUSE Leap 15.2
updates/sle
salt 3002.2 Potentially vulnerable System/Management -
openSUSE Leap 15.2
updates/sle
salt 3002.2 Potentially vulnerable System/Management -
openSUSE Leap 15.2
updates/sle
salt 3002.2 Potentially vulnerable System/Management -
openSUSE Leap 15.2
updates/sle
salt 3002.2 Potentially vulnerable System/Management -
openSUSE Leap 15.2
updates/sle
salt 3002.2 Potentially vulnerable System/Management -
openSUSE Leap 15.2
updates/sle
salt 3002.2 Potentially vulnerable System/Management -
openSUSE Leap 15.2
main/oss
salt 3000 Potentially vulnerable System/Management -
openSUSE Leap 15.2
updates/oss
salt 3000 Potentially vulnerable System/Management -
openSUSE Leap 15.2
updates/oss
salt 3000 Potentially vulnerable System/Management -
openSUSE Leap 15.2
updates/oss
salt 3000 Potentially vulnerable System/Management -
openSUSE Leap 15.2
updates/oss
salt 3000 Potentially vulnerable System/Management -
openSUSE Leap 15.2
updates/oss
salt 3000 Potentially vulnerable System/Management -
openSUSE Leap 15.2
updates/oss
salt 3000 Potentially vulnerable System/Management -
openSUSE Leap 15.2
updates/oss
salt 3000 Potentially vulnerable System/Management -
openSUSE Leap 15.2
updates/oss
salt 3000 Potentially vulnerable System/Management -
openSUSE Leap 15.2
updates/oss
salt 3000 Potentially vulnerable System/Management -
openSUSE Leap 15.2
updates/oss
salt 3000 Potentially vulnerable System/Management -
openSUSE Leap 15.2
updates/oss
salt 3000 Potentially vulnerable System/Management -
openSUSE Leap 15.3
updates/sle
salt 3004 Potentially vulnerable System/Management -
openSUSE Leap 15.3
updates/sle
salt 3004 Potentially vulnerable System/Management -
openSUSE Leap 15.3
updates/sle
salt 3004 Potentially vulnerable System/Management -
openSUSE Leap 15.3
updates/sle
salt 3004 Potentially vulnerable System/Management -
openSUSE Leap 15.3
updates/sle
salt 3004 Potentially vulnerable System/Management -
openSUSE Leap 15.3
main/oss
salt 3002.2 Potentially vulnerable System/Management -
openSUSE Leap 15.3
updates/sle
salt 3002.2 Potentially vulnerable System/Management -
openSUSE Leap 15.3
updates/sle
salt 3002.2 Potentially vulnerable System/Management -
openSUSE Leap 15.3
updates/sle
salt 3002.2 Potentially vulnerable System/Management -
openSUSE Leap 15.3
updates/sle
salt 3002.2 Potentially vulnerable System/Management -
openSUSE Leap 15.3
updates/sle
salt 3002.2 Potentially vulnerable System/Management -
openSUSE Leap 15.3
updates/sle
salt 3002.2 Potentially vulnerable System/Management -
openSUSE Leap 15.3
updates/sle
salt 3002.2 Potentially vulnerable System/Management -
openSUSE Leap 15.3
updates/sle
salt 3002.2 Potentially vulnerable System/Management -
openSUSE Leap 15.4
main/oss
salt 3004 Potentially vulnerable System/Management -
openSUSE Leap 15.4
updates/sle
salt 3004 Potentially vulnerable System/Management -
openSUSE Leap 15.4
updates/sle
salt 3004 Potentially vulnerable System/Management -
openSUSE Leap 15.4
updates/sle
salt 3004 Potentially vulnerable System/Management -
openSUSE Leap 15.4
updates/sle
salt 3004 Potentially vulnerable System/Management -
openSUSE Leap 15.4
updates/sle
salt 3004 Potentially vulnerable System/Management -
openSUSE Leap 15.4
updates/sle
salt 3002.2 Potentially vulnerable System/Management -
openSUSE Leap 15.4
updates/sle
salt 3002.2 Potentially vulnerable System/Management -
openSUSE Leap 15.4
updates/sle
salt 3002.2 Potentially vulnerable System/Management -
openSUSE Leap 15.4
updates/sle
salt 3002.2 Potentially vulnerable System/Management -
openSUSE Leap 15.4
updates/sle
salt 3002.2 Potentially vulnerable System/Management -
openSUSE Leap 15.4
updates/sle
salt 3002.2 Potentially vulnerable System/Management -
openSUSE Leap 15.4
updates/sle
salt 3002.2 Potentially vulnerable System/Management -
openSUSE Leap 15.4
updates/sle
salt 3002.2 Potentially vulnerable System/Management -
openSUSE Leap 15.5
main/oss
salt 3005.1 Potentially vulnerable System/Management -
openSUSE Leap 15.5
updates/sle
salt 3004 Potentially vulnerable System/Management -
openSUSE Leap 15.5
updates/sle
salt 3004 Potentially vulnerable System/Management -
openSUSE Leap 15.5
updates/sle
salt 3004 Potentially vulnerable System/Management -
openSUSE Leap 15.5
updates/sle
salt 3004 Potentially vulnerable System/Management -
openSUSE Leap 15.5
updates/sle
salt 3004 Potentially vulnerable System/Management -
openSUSE Leap 15.5
updates/sle
salt 3002.2 Potentially vulnerable System/Management -
openSUSE Leap 15.5
updates/sle
salt 3002.2 Potentially vulnerable System/Management -
openSUSE Leap 15.5
updates/sle
salt 3002.2 Potentially vulnerable System/Management -
openSUSE Leap 15.5
updates/sle
salt 3002.2 Potentially vulnerable System/Management -
openSUSE Leap 15.5
updates/sle
salt 3002.2 Potentially vulnerable System/Management -
openSUSE Leap 15.5
updates/sle
salt 3002.2 Potentially vulnerable System/Management -
openSUSE Leap 15.5
updates/sle
salt 3002.2 Potentially vulnerable System/Management -
openSUSE Leap 15.5
updates/sle
salt 3002.2 Potentially vulnerable System/Management -
openSUSE Tumbleweed
src-oss
salt 3006.0 Potentially vulnerable System/Management -
Parabola
extra
salt 3006.1 Potentially vulnerable - -
Pardus 21
main
salt 3002.6 Potentially vulnerable admin pkg-salt-team@alioth-lists.debian.net, benjamin.drung@ionos.com, franklin.g.mendoza@gmail.com, joehealy@gmail.com, jolly_roger@itblog.org.ua, onovy@debian.org
Pardus 21
updates/main
salt 3002.6 Potentially vulnerable admin pkg-salt-team@alioth-lists.debian.net, benjamin.drung@ionos.com, franklin.g.mendoza@gmail.com, joehealy@gmail.com, jolly_roger@itblog.org.ua, onovy@debian.org
Parrot
parrot/main
salt 3002.6 Potentially vulnerable admin pkg-salt-team@alioth-lists.debian.net, benjamin.drung@ionos.com, franklin.g.mendoza@gmail.com, joehealy@gmail.com, jolly_roger@itblog.org.ua, onovy@debian.org
Parrot
parrot-updates/main
salt 3002.6 Potentially vulnerable admin pkg-salt-team@alioth-lists.debian.net, benjamin.drung@ionos.com, franklin.g.mendoza@gmail.com, joehealy@gmail.com, jolly_roger@itblog.org.ua, onovy@debian.org
pkgsrc current sysutils/salt 3005.1 Potentially vulnerable sysutils pkgsrc-users@netbsd.org
PureOS Amber salt 2018.3.4 Potentially vulnerable admin pkg-salt-team@lists.alioth.debian.org, benjamin.drung@cloud.ionos.com, franklin.g.mendoza@gmail.com, joehealy@gmail.com, jolly_roger@itblog.org.ua, onovy@debian.org
PyPI salt 3006.4 - thatch45@gmail.com
Raspbian Oldstable
main
salt 3002.6 Potentially vulnerable admin pkg-salt-team@alioth-lists.debian.net, benjamin.drung@ionos.com, franklin.g.mendoza@gmail.com, joehealy@gmail.com, jolly_roger@itblog.org.ua, onovy@debian.org
Raspbian Stable
main
salt 3004.1 Potentially vulnerable admin pkg-salt-team@alioth-lists.debian.net, bdrung@debian.org, franklin.g.mendoza@gmail.com, joehealy@gmail.com, jolly_roger@itblog.org.ua, onovy@debian.org
Raspbian Testing
main
salt 3004.1 Potentially vulnerable admin pkg-salt-team@alioth-lists.debian.net, bdrung@debian.org, franklin.g.mendoza@gmail.com, joehealy@gmail.com, jolly_roger@itblog.org.ua, onovy@debian.org
Ravenports python-salt 3006.4 python fallback-mnt-ravenports@repology
Rosa 2016.1
main/updates
salt 2019.2.0 Potentially vulnerable - -
Rosa 2021.1
main/release
salt 3006.3 System/Base a.proklov@rosalinux.ru
Trisquel 11.0
aramo/main
salt 3004.1 Potentially vulnerable universe/admin pkg-salt-team@alioth-lists.debian.net, bdrung@debian.org, franklin.g.mendoza@gmail.com, joehealy@gmail.com, jolly_roger@itblog.org.ua, onovy@debian.org
Ubuntu 14.04
trusty/universe
salt 0.17.5 Potentially vulnerable universe/admin pkg-salt-team@lists.alioth.debian.org, franklin.g.mendoza@gmail.com, joehealy@gmail.com, jolly_roger@itblog.org.ua
Ubuntu 16.04
xenial/universe
salt 2015.8.8 Potentially vulnerable universe/admin pkg-salt-team@lists.alioth.debian.org, benjamin.drung@profitbricks.com, debian@babilen5.org, franklin.g.mendoza@gmail.com, joehealy@gmail.com, jolly_roger@itblog.org.ua
Ubuntu 16.04
xenial-updates/universe
salt 2015.8.8 Potentially vulnerable universe/admin ubuntu-devel-discuss@lists.ubuntu.com, benjamin.drung@profitbricks.com, debian@babilen5.org, franklin.g.mendoza@gmail.com, joehealy@gmail.com, jolly_roger@itblog.org.ua
Ubuntu 18.04
bionic-updates/universe
salt 2017.7.4 Potentially vulnerable universe/admin ubuntu-devel-discuss@lists.ubuntu.com, benjamin.drung@profitbricks.com, debian@babilen5.org, franklin.g.mendoza@gmail.com, joehealy@gmail.com, jolly_roger@itblog.org.ua, onovy@debian.org
Ubuntu 18.04
bionic/universe
salt 2017.7.4 Potentially vulnerable universe/admin pkg-salt-team@lists.alioth.debian.org, benjamin.drung@profitbricks.com, debian@babilen5.org, franklin.g.mendoza@gmail.com, joehealy@gmail.com, jolly_roger@itblog.org.ua, onovy@debian.org
Ubuntu 22.04
jammy/universe
salt 3004.1 Potentially vulnerable universe/admin pkg-salt-team@alioth-lists.debian.net, bdrung@debian.org, franklin.g.mendoza@gmail.com, joehealy@gmail.com, jolly_roger@itblog.org.ua, onovy@debian.org
Void Linux x86_64
x86_64
salt 3006.4 - vaelatern@voidlinux.org
Wikidata Salt 3006.1 Potentially vulnerable - -
winget Salt Minion 30.05.1 Potentially vulnerable management -
winget Salt Minion 30.04.2 Potentially vulnerable management -