Worker process denial of service through file read operation. .A vulnerability exists in the Master's “pub_ret” method which is exposed to all minions. The un-sanitized input value “jid” is used to construct a path which is then opened for reading. An attacker could exploit this vulnerabilities by attempting to read from a filename that will not return any data, e.g. by targeting a pipe node on the proc file system.
https://docs.saltproject.io/en/3007/topics/releases/3007.4.html
https://docs.saltproject.io/en/3006/topics/releases/3006.12.html