We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
Worker process denial of service through file read operation. .A vulnerability exists in the Master's “pub_ret” method which is exposed to all minions. The un-sanitized input value “jid” is used to construct a path which is then opened for reading. An attacker could exploit this vulnerabilities by attempting to read from a filename that will not return any data, e.g. by targeting a pipe node on the proc file system.
Reserved 2025-01-02 | Published 2025-06-13 | Updated 2025-06-13 | Assigner vmwaredocs.saltproject.io/en/3006/topics/releases/3006.12.html
docs.saltproject.io/en/3007/topics/releases/3007.4.html
Support options