Bug 2397965

Summary: CVE-2025-1131 libss7: Asterisk Unsafe Shell Sourcing Leads to Local Privilege Escalation [fedora-42]
Product: [Fedora] Fedora Reporter: Jon Moroney <jmoroney>
Component: libss7Assignee: Ben Beasley <code>
Status: CLOSED NOTABUG QA Contact: Fedora Extras Quality Assurance <extras-qa>
Severity: high Docs Contact:
Priority: high    
Version: 42CC: code, jsmith.fedora
Target Milestone: ---Keywords: Security, SecurityTracking
Target Release: ---   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard: {"flaws": ["880a53d0-0e73-427a-a690-fe61db9a5d0d"]}
Fixed In Version: Doc Type: ---
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2025-09-24 21:30:40 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 2397550    

Description Jon Moroney 2025-09-24 20:35:34 UTC
Disclaimer: Community trackers are created by Red Hat Product Security team on a best effort basis. Package maintainers are required to ascertain if the flaw indeed affects their package, before starting the update process.

The following link provides references to all essential vulnerability management information. If something is wrong or missing, please contact a member of PSIRT.
https://spaces.redhat.com/display/PRODSEC/Vulnerability+Management+-+Essential+Documents+for+Engineering+Teams

Comment 1 Ben Beasley 2025-09-24 21:30:40 UTC
Per https://www.cve.org/CVERecord?id=CVE-2025-1131:

> A local privilege escalation vulnerability exists in the safe_asterisk script included with the Asterisk toolkit package. When Asterisk is started via this script (common in SysV init or FreePBX environments), it sources all .sh files located in /etc/asterisk/startup.d/ as root, without validating ownership or permissions. Non-root users with legitimate write access to /etc/asterisk can exploit this behaviour by placing malicious scripts in the startup.d directory, which will then execute with root privileges upon service restart.

While libss7 belongs to the Asterisk stack, it provides only a C shared library. It does not include the safe_asterisk script or any other shell scripts. It is therefore not affected by CVE-2025-1131.