The salt-ssh minion code in SaltStack Salt 2016.11 before 2016.11.4 copied over configuration from the Salt Master without adjusting permissions, which might leak credentials to local attackers on configured minions (clients).
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
https://github.com/saltstack/salt/pull/40609/commits/6e34c2b5e5e849302af7ccd00509929c3809c658 | issue tracking third party advisory patch |
https://github.com/saltstack/salt/issues/40075 | issue tracking third party advisory patch |
https://github.com/saltstack/salt/pull/40609 | issue tracking third party advisory patch |
https://bugzilla.suse.com/show_bug.cgi?id=1035912 | issue tracking patch |
http://www.securityfocus.com/bid/98095 | vdb entry third party advisory |
https://docs.saltstack.com/en/latest/topics/releases/2016.11.4.html | release notes patch vendor advisory |