Multiple unspecified vulnerabilities in Salt (aka SaltStack) before 2014.1.10 allow local users to have an unspecified impact via vectors related to temporary file creation in (1) seed.py, (2) salt-ssh, or (3) salt-cloud.
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "ubuntu_priority": "low", "binaries": [ { "binary_version": "0.17.5+ds-1ubuntu0.1~esm1", "binary_name": "salt-common" }, { "binary_version": "0.17.5+ds-1ubuntu0.1~esm1", "binary_name": "salt-doc" }, { "binary_version": "0.17.5+ds-1ubuntu0.1~esm1", "binary_name": "salt-master" }, { "binary_version": "0.17.5+ds-1ubuntu0.1~esm1", "binary_name": "salt-minion" }, { "binary_version": "0.17.5+ds-1ubuntu0.1~esm1", "binary_name": "salt-ssh" }, { "binary_version": "0.17.5+ds-1ubuntu0.1~esm1", "binary_name": "salt-syndic" } ] }