Salt 2016.11.2 is a security release. The following CVEs were fixed as part of this release: CVE-2017-5192: local_batch client external authentication not respected The `LocalClient.cmd_batch()` method client does not accept `external_auth` credentials and so access to it from salt-api has been removed for now. This vulnerability allows code execution for already-authenticated users and is only in effect when running salt-api as the `root` user. CVE-2017-5200: Salt-api allows arbitrary command execution on a salt-master via Salt's ssh_client Users of Salt-API and salt-ssh could execute a command on the salt master via a hole when both systems were enabled.
2016.3.x also affected, 2016.3.5 now released, see https://docs.saltstack.com/en/2016.3/topics/releases/2016.3.5.html
And now we are complete, 2015.8.x also affected, 2015.8.13 now released, see https://docs.saltstack.com/en/2016.3/topics/releases/2015.8.13.html
2016.11.2, 2016.3.5 and 2015.8.13 added to the tree and vulnerable versions removed
@ Maintainer(s): Thank you for the bump. Package had no stable version, so no stabilization needed. Repository is clean, all done.