Bug 2397965
Summary: | CVE-2025-1131 libss7: Asterisk Unsafe Shell Sourcing Leads to Local Privilege Escalation [fedora-42] | ||
---|---|---|---|
Product: | [Fedora] Fedora | Reporter: | Jon Moroney <jmoroney> |
Component: | libss7 | Assignee: | Ben Beasley <code> |
Status: | CLOSED NOTABUG | QA Contact: | Fedora Extras Quality Assurance <extras-qa> |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | 42 | CC: | code, jsmith.fedora |
Target Milestone: | --- | Keywords: | Security, SecurityTracking |
Target Release: | --- | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | {"flaws": ["880a53d0-0e73-427a-a690-fe61db9a5d0d"]} | ||
Fixed In Version: | Doc Type: | --- | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2025-09-24 21:30:40 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | |||
Bug Blocks: | 2397550 |
Description
Jon Moroney
2025-09-24 20:35:34 UTC
Per https://www.cve.org/CVERecord?id=CVE-2025-1131: > A local privilege escalation vulnerability exists in the safe_asterisk script included with the Asterisk toolkit package. When Asterisk is started via this script (common in SysV init or FreePBX environments), it sources all .sh files located in /etc/asterisk/startup.d/ as root, without validating ownership or permissions. Non-root users with legitimate write access to /etc/asterisk can exploit this behaviour by placing malicious scripts in the startup.d directory, which will then execute with root privileges upon service restart. While libss7 belongs to the Asterisk stack, it provides only a C shared library. It does not include the safe_asterisk script or any other shell scripts. It is therefore not affected by CVE-2025-1131. |