The salt-ssh minion code in SaltStack Salt 2016.11 before 2016.11.4 copied over configuration from the Salt Master without adjusting permissions, which might leak credentials to local attackers on configured minions (clients).
{
"extracted_events": [
{
"introduced": "0"
},
{
"last_affected": "2016.11"
},
{
"last_affected": "2016.11.0"
},
{
"last_affected": "2016.11.0-rc1"
},
{
"last_affected": "2016.11.0-rc2"
},
{
"last_affected": "2016.11.1"
},
{
"last_affected": "2016.11.2"
},
{
"last_affected": "2016.11.3"
}
],
"cpe": [
"cpe:2.3:a:saltstack:salt:2016.11:*:*:*:*:*:*:*",
"cpe:2.3:a:saltstack:salt:2016.11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:saltstack:salt:2016.11.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:saltstack:salt:2016.11.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:saltstack:salt:2016.11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:saltstack:salt:2016.11.2:*:*:*:*:*:*:*",
"cpe:2.3:a:saltstack:salt:2016.11.3:*:*:*:*:*:*:*"
],
"source": "CPE_FIELD"
}