Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-3528

Опубликовано: 11 апр. 2024
Источник: redhat
CVSS3: 8.2

Описание

A flaw was found in the Mirror Registry. The quay-app container shipped as part of the Mirror Registry for OpenShift has write access to the /etc/passwd. This flaw allows a malicious actor with access to the container to modify the passwd file and elevate their privileges to the root user within that pod.

Отчет

This issue was classified with and Important severity according to the severity ratings described at https://access.redhat.com/security/updates/classification. This rating was given because the attacker, when a successfully attack is performed, can elevate its privilege to the root user.

Меры по смягчению последствий

This issue can be mitigated by setting this line in each mirror registry systemd configurations: --security-opt=no-new-privileges This would prevent any privilege escalation until the issue is fixed.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
mirror registry for Red Hat OpenShiftmirror-registry-containerAffected
MIRROR-REGISTRY-2.0-RHEL-8openshift/mirror-registry-rhel8FixedRHBA-2025:964514.07.2025

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-276
https://bugzilla.redhat.com/show_bug.cgi?id=2359143mirror-registry: Local privilege escalation due to incorrect permissions in mirror-registry

8.2 High

CVSS3

Связанные уязвимости

CVSS3: 8.2
nvd
4 месяца назад

A flaw was found in the Mirror Registry. The quay-app container shipped as part of the Mirror Registry for OpenShift has write access to the `/etc/passwd`. This flaw allows a malicious actor with access to the container to modify the passwd file and elevate their privileges to the root user within that pod.

CVSS3: 8.2
github
4 месяца назад

A flaw was found in the Mirror Registry. The quay-app container shipped as part of the Mirror Registry for OpenShift has write access to the `/etc/passwd`. This flaw allows a malicious actor with access to the container to modify the passwd file and elevate their privileges to the root user within that pod.

8.2 High

CVSS3