First published: Tue Apr 25 2017(Updated: )
The salt-ssh minion code in SaltStack Salt 2016.11 before 2016.11.4 copied over configuration from the Salt Master without adjusting permissions, which might leak credentials to local attackers on configured minions (clients).
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SaltStack Salt | =2016.11 | |
SaltStack Salt | =2016.11.0 | |
SaltStack Salt | =2016.11.0-rc1 | |
SaltStack Salt | =2016.11.0-rc2 | |
SaltStack Salt | =2016.11.1 | |
SaltStack Salt | =2016.11.2 | |
SaltStack Salt | =2016.11.3 | |
pip/salt | >=2016.11<2016.11.4 | 2016.11.4 |
=2016.11 | ||
=2016.11.0 | ||
=2016.11.0-rc1 | ||
=2016.11.0-rc2 | ||
=2016.11.1 | ||
=2016.11.2 | ||
=2016.11.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.