The salt-ssh minion code in SaltStack Salt 2016.11 before 2016.11.4 copied over configuration from the Salt Master without adjusting permissions, which might leak credentials to local attackers on configured minions (clients).
{
"binaries": [
{
"binary_name": "salt-api",
"binary_version": "2017.7.4+dfsg1-1"
},
{
"binary_name": "salt-cloud",
"binary_version": "2017.7.4+dfsg1-1"
},
{
"binary_name": "salt-common",
"binary_version": "2017.7.4+dfsg1-1"
},
{
"binary_name": "salt-doc",
"binary_version": "2017.7.4+dfsg1-1"
},
{
"binary_name": "salt-master",
"binary_version": "2017.7.4+dfsg1-1"
},
{
"binary_name": "salt-minion",
"binary_version": "2017.7.4+dfsg1-1"
},
{
"binary_name": "salt-proxy",
"binary_version": "2017.7.4+dfsg1-1"
},
{
"binary_name": "salt-ssh",
"binary_version": "2017.7.4+dfsg1-1"
},
{
"binary_name": "salt-syndic",
"binary_version": "2017.7.4+dfsg1-1"
}
],
"availability": "No subscription required"
}