Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-18248 | Salt's worker process vulnerable to denial of service through file read operation |
Github GHSA |
GHSA-989c-m532-p2hv | Salt's worker process vulnerable to denial of service through file read operation |
Tue, 15 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Tue, 17 Jun 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-400 |
Fri, 13 Jun 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 13 Jun 2025 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Worker process denial of service through file read operation. .A vulnerability exists in the Master's “pub_ret” method which is exposed to all minions. The un-sanitized input value “jid” is used to construct a path which is then opened for reading. An attacker could exploit this vulnerabilities by attempting to read from a filename that will not return any data, e.g. by targeting a pipe node on the proc file system. | |
| Title | CVE-2025-22242 salt advisory | |
| References |
| |
| Metrics |
cvssV3_1
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: vmware
Published:
Updated: 2025-06-17T17:25:29.513Z
Reserved: 2025-01-02T04:30:06.833Z
Link: CVE-2025-22242
Updated: 2025-06-13T15:24:01.021Z
Status : Deferred
Published: 2025-06-13T07:15:21.710
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-22242
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA