CVE-2025-22242

Name
CVE-2025-22242
Description
Worker process denial of service through file read operation. .A vulnerability exists in the Master's “pub_ret” method which is exposed to all minions. The un-sanitized input value “jid” is used to construct a path which is then opened for reading. An attacker could exploit this vulnerabilities by attempting to read from a filename that will not return any data, e.g. by targeting a pipe node on the proc file system.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
security@vmware.com https://docs.saltproject.io/en/3006/topics/releases/3006.12.html
security@vmware.com https://docs.saltproject.io/en/3007/topics/releases/3007.4.html

Match rules

CPE URI Source package Min version Max version
salt >= 3006.x < 3006.12
salt >= 3007.x < 3007.4

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
salt edge-community 3007.3-r0 Will Sinatra <wpsinatra@gmail.com> possibly vulnerable
salt edge-community 3007.2-r1 Will Sinatra <wpsinatra@gmail.com> possibly vulnerable
salt edge-community 3007.2-r0 Will Sinatra <wpsinatra@gmail.com> possibly vulnerable
salt edge-community 3007.1-r1 Will Sinatra <wpsinatra@gmail.com> possibly vulnerable
salt edge-community 3006.6-r0 Kevin Daudt <kdaudt@alpinelinux.org> possibly vulnerable
salt 3.22-community 3007.2-r1 Will Sinatra <wpsinatra@gmail.com> possibly vulnerable
salt 3.22-community 3007.1-r1 Will Sinatra <wpsinatra@gmail.com> possibly vulnerable
salt 3.22-community 3006.6-r0 None possibly vulnerable