The salt-ssh minion code in SaltStack Salt 2016.11 before 2016.11.4 copied over configuration from the Salt Master without adjusting permissions, which might leak credentials to local attackers on configured minions (clients).
{ "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "salt-api", "binary_version": "2017.7.4+dfsg1-1" }, { "binary_name": "salt-cloud", "binary_version": "2017.7.4+dfsg1-1" }, { "binary_name": "salt-common", "binary_version": "2017.7.4+dfsg1-1" }, { "binary_name": "salt-doc", "binary_version": "2017.7.4+dfsg1-1" }, { "binary_name": "salt-master", "binary_version": "2017.7.4+dfsg1-1" }, { "binary_name": "salt-minion", "binary_version": "2017.7.4+dfsg1-1" }, { "binary_name": "salt-proxy", "binary_version": "2017.7.4+dfsg1-1" }, { "binary_name": "salt-ssh", "binary_version": "2017.7.4+dfsg1-1" }, { "binary_name": "salt-syndic", "binary_version": "2017.7.4+dfsg1-1" } ] }