Bug 2372628 (CVE-2025-22240)
Summary: | CVE-2025-22240 salt: Path traversal in saltstack | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | OSIDB Bzimport <bzimport> |
Component: | vulnerability | Assignee: | Product Security DevOps Team <prodsec-dev> |
Status: | NEW --- | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | Keywords: | Security |
Target Milestone: | --- | ||
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | --- | |
Doc Text: |
A path traversal flaw has been discovered in the salt project. In the find_file method of the GitFS class a path is created without validation. An attacker who is able to get user input to this method may be able to create or delete specific files that the salt master process has access to.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | Type: | --- | |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2372738, 2372742, 2372746, 2372752 | ||
Bug Blocks: |
Description
OSIDB Bzimport
2025-06-13 08:01:00 UTC
|