RHBA-2024:11569

Vulnerability from csaf_redhat - Published: 2025-01-08 09:43 - Updated: 2025-12-09 06:41
Summary
Red Hat Bug Fix Advisory: Red Hat build of Apicurio Registry 3.0.6 Beta OpenShift images

Notes

Topic
3.0.6 Beta release of Red Hat build of Apicurio Registry.
Details
This advisory makes available an update to the Red Hat build of Apicurio Registry images.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "3.0.6 Beta release of Red Hat build of Apicurio Registry.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "This advisory makes available an update to the Red Hat build of Apicurio Registry images.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHBA-2024:11569",
        "url": "https://access.redhat.com/errata/RHBA-2024:11569"
      },
      {
        "category": "external",
        "summary": "https://docs.redhat.com/en/documentation/red_hat_build_of_apicurio_registry/3.0",
        "url": "https://docs.redhat.com/en/documentation/red_hat_build_of_apicurio_registry/3.0"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhba-2024_11569.json"
      }
    ],
    "title": "Red Hat Bug Fix Advisory: Red Hat build of Apicurio Registry 3.0.6 Beta OpenShift images",
    "tracking": {
      "current_release_date": "2025-12-09T06:41:33+00:00",
      "generator": {
        "date": "2025-12-09T06:41:33+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.13"
        }
      },
      "id": "RHBA-2024:11569",
      "initial_release_date": "2025-01-08T09:43:15+00:00",
      "revision_history": [
        {
          "date": "2025-01-08T09:43:15+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2025-01-08T09:43:15+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-12-09T06:41:33+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Middleware Containers for OpenShift",
                "product": {
                  "name": "Middleware Containers for OpenShift",
                  "product_id": "8Base-RHOSE-Middleware",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhosemc:1.0::el8"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat OpenShift Enterprise"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "apicurio/apicurio-registry-3-operator-bundle@sha256:f2465c11816ed5485383c0ad75f2db165def459c65989521d961c88109a3ec98_amd64",
                "product": {
                  "name": "apicurio/apicurio-registry-3-operator-bundle@sha256:f2465c11816ed5485383c0ad75f2db165def459c65989521d961c88109a3ec98_amd64",
                  "product_id": "apicurio/apicurio-registry-3-operator-bundle@sha256:f2465c11816ed5485383c0ad75f2db165def459c65989521d961c88109a3ec98_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/apicurio-registry-3-operator-bundle@sha256:f2465c11816ed5485383c0ad75f2db165def459c65989521d961c88109a3ec98?arch=amd64\u0026repository_url=registry.redhat.io/apicurio/apicurio-registry-3-operator-bundle\u0026tag=3.0.6-5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "apicurio/apicurio-registry-rhel8@sha256:b6b710d7f748c3619360359cf02034200896c496d7560ef1871f25b43b2818a1_amd64",
                "product": {
                  "name": "apicurio/apicurio-registry-rhel8@sha256:b6b710d7f748c3619360359cf02034200896c496d7560ef1871f25b43b2818a1_amd64",
                  "product_id": "apicurio/apicurio-registry-rhel8@sha256:b6b710d7f748c3619360359cf02034200896c496d7560ef1871f25b43b2818a1_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/apicurio-registry-rhel8@sha256:b6b710d7f748c3619360359cf02034200896c496d7560ef1871f25b43b2818a1?arch=amd64\u0026repository_url=registry.redhat.io/apicurio/apicurio-registry-rhel8\u0026tag=3.0.6-1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "apicurio/apicurio-registry-rhel8-operator@sha256:33cc8950a0ff4c8067f2bb5b57e583c0eec1f531db391a2c4a95d3accab96e21_amd64",
                "product": {
                  "name": "apicurio/apicurio-registry-rhel8-operator@sha256:33cc8950a0ff4c8067f2bb5b57e583c0eec1f531db391a2c4a95d3accab96e21_amd64",
                  "product_id": "apicurio/apicurio-registry-rhel8-operator@sha256:33cc8950a0ff4c8067f2bb5b57e583c0eec1f531db391a2c4a95d3accab96e21_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/apicurio-registry-rhel8-operator@sha256:33cc8950a0ff4c8067f2bb5b57e583c0eec1f531db391a2c4a95d3accab96e21?arch=amd64\u0026repository_url=registry.redhat.io/apicurio/apicurio-registry-rhel8-operator\u0026tag=3.0.6-1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "apicurio/apicurio-registry-ui-rhel8@sha256:b6b35c3d567fef2a5ab21337e3cedee4e0eb019fb7ff60d9ef18756e5efbfaed_amd64",
                "product": {
                  "name": "apicurio/apicurio-registry-ui-rhel8@sha256:b6b35c3d567fef2a5ab21337e3cedee4e0eb019fb7ff60d9ef18756e5efbfaed_amd64",
                  "product_id": "apicurio/apicurio-registry-ui-rhel8@sha256:b6b35c3d567fef2a5ab21337e3cedee4e0eb019fb7ff60d9ef18756e5efbfaed_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/apicurio-registry-ui-rhel8@sha256:b6b35c3d567fef2a5ab21337e3cedee4e0eb019fb7ff60d9ef18756e5efbfaed?arch=amd64\u0026repository_url=registry.redhat.io/apicurio/apicurio-registry-ui-rhel8\u0026tag=3.0.6-1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "apicurio/apicurio-studio-ui-rhel8@sha256:eec7ae42c90e2ca103375d996656ebcf072e5e117bfc22f3ad83a640823c0266_amd64",
                "product": {
                  "name": "apicurio/apicurio-studio-ui-rhel8@sha256:eec7ae42c90e2ca103375d996656ebcf072e5e117bfc22f3ad83a640823c0266_amd64",
                  "product_id": "apicurio/apicurio-studio-ui-rhel8@sha256:eec7ae42c90e2ca103375d996656ebcf072e5e117bfc22f3ad83a640823c0266_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/apicurio-studio-ui-rhel8@sha256:eec7ae42c90e2ca103375d996656ebcf072e5e117bfc22f3ad83a640823c0266?arch=amd64\u0026repository_url=registry.redhat.io/apicurio/apicurio-studio-ui-rhel8\u0026tag=1.1.0-4"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "amd64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apicurio/apicurio-registry-3-operator-bundle@sha256:f2465c11816ed5485383c0ad75f2db165def459c65989521d961c88109a3ec98_amd64 as a component of Middleware Containers for OpenShift",
          "product_id": "8Base-RHOSE-Middleware:apicurio/apicurio-registry-3-operator-bundle@sha256:f2465c11816ed5485383c0ad75f2db165def459c65989521d961c88109a3ec98_amd64"
        },
        "product_reference": "apicurio/apicurio-registry-3-operator-bundle@sha256:f2465c11816ed5485383c0ad75f2db165def459c65989521d961c88109a3ec98_amd64",
        "relates_to_product_reference": "8Base-RHOSE-Middleware"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apicurio/apicurio-registry-rhel8-operator@sha256:33cc8950a0ff4c8067f2bb5b57e583c0eec1f531db391a2c4a95d3accab96e21_amd64 as a component of Middleware Containers for OpenShift",
          "product_id": "8Base-RHOSE-Middleware:apicurio/apicurio-registry-rhel8-operator@sha256:33cc8950a0ff4c8067f2bb5b57e583c0eec1f531db391a2c4a95d3accab96e21_amd64"
        },
        "product_reference": "apicurio/apicurio-registry-rhel8-operator@sha256:33cc8950a0ff4c8067f2bb5b57e583c0eec1f531db391a2c4a95d3accab96e21_amd64",
        "relates_to_product_reference": "8Base-RHOSE-Middleware"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apicurio/apicurio-registry-rhel8@sha256:b6b710d7f748c3619360359cf02034200896c496d7560ef1871f25b43b2818a1_amd64 as a component of Middleware Containers for OpenShift",
          "product_id": "8Base-RHOSE-Middleware:apicurio/apicurio-registry-rhel8@sha256:b6b710d7f748c3619360359cf02034200896c496d7560ef1871f25b43b2818a1_amd64"
        },
        "product_reference": "apicurio/apicurio-registry-rhel8@sha256:b6b710d7f748c3619360359cf02034200896c496d7560ef1871f25b43b2818a1_amd64",
        "relates_to_product_reference": "8Base-RHOSE-Middleware"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apicurio/apicurio-registry-ui-rhel8@sha256:b6b35c3d567fef2a5ab21337e3cedee4e0eb019fb7ff60d9ef18756e5efbfaed_amd64 as a component of Middleware Containers for OpenShift",
          "product_id": "8Base-RHOSE-Middleware:apicurio/apicurio-registry-ui-rhel8@sha256:b6b35c3d567fef2a5ab21337e3cedee4e0eb019fb7ff60d9ef18756e5efbfaed_amd64"
        },
        "product_reference": "apicurio/apicurio-registry-ui-rhel8@sha256:b6b35c3d567fef2a5ab21337e3cedee4e0eb019fb7ff60d9ef18756e5efbfaed_amd64",
        "relates_to_product_reference": "8Base-RHOSE-Middleware"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apicurio/apicurio-studio-ui-rhel8@sha256:eec7ae42c90e2ca103375d996656ebcf072e5e117bfc22f3ad83a640823c0266_amd64 as a component of Middleware Containers for OpenShift",
          "product_id": "8Base-RHOSE-Middleware:apicurio/apicurio-studio-ui-rhel8@sha256:eec7ae42c90e2ca103375d996656ebcf072e5e117bfc22f3ad83a640823c0266_amd64"
        },
        "product_reference": "apicurio/apicurio-studio-ui-rhel8@sha256:eec7ae42c90e2ca103375d996656ebcf072e5e117bfc22f3ad83a640823c0266_amd64",
        "relates_to_product_reference": "8Base-RHOSE-Middleware"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Antony Di Scala",
            "Michael Whale",
            "James Force"
          ]
        }
      ],
      "cve": "CVE-2025-7195",
      "cwe": {
        "id": "CWE-276",
        "name": "Incorrect Default Permissions"
      },
      "discovery_date": "2025-07-04T08:54:01.878000+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2376300"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Early versions of Operator-SDK provided an insecure method to allow operator containers to run in environments that used a random UID. Operator-SDK before 0.15.2 provided a script, user_setup, which modifies the permissions of the /etc/passwd file to 664 during build time. Developers who used Operator-SDK before 0.15.2 to scaffold their operator may still be impacted by this if the insecure user_setup script is still being used to build new container images. \n\nIn affected images, the /etc/passwd file is created during build time with group-writable permissions and a group ownership of root (gid=0). An attacker who can execute commands within an affected container, even as a non-root user, may be able to leverage their membership in the root group to modify the /etc/passwd file. This could allow the attacker to add a new user with any arbitrary UID, including UID 0, leading to full root privileges within the container.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "operator-sdk: privilege escalation due to incorrect permissions of /etc/passwd",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security has rated this vulnerability as low severity for affected products which run on OpenShift. The vulnerability allows for potential privilege escalation within a container, but OpenShift\u0027s default, multi-layered security posture effectively mitigates this risk. \n\nThe primary controls include the default Security Context Constraints (SCC), which severely limit a container\u0027s permissions from the start, and SELinux, which enforces mandatory access control to ensure strict isolation. While other container runtime environments may have different controls available and require case-by-case analysis, OpenShift\u0027s built-in defenses are designed to prevent this type of attack.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "8Base-RHOSE-Middleware:apicurio/apicurio-registry-3-operator-bundle@sha256:f2465c11816ed5485383c0ad75f2db165def459c65989521d961c88109a3ec98_amd64",
          "8Base-RHOSE-Middleware:apicurio/apicurio-registry-rhel8-operator@sha256:33cc8950a0ff4c8067f2bb5b57e583c0eec1f531db391a2c4a95d3accab96e21_amd64",
          "8Base-RHOSE-Middleware:apicurio/apicurio-registry-rhel8@sha256:b6b710d7f748c3619360359cf02034200896c496d7560ef1871f25b43b2818a1_amd64",
          "8Base-RHOSE-Middleware:apicurio/apicurio-registry-ui-rhel8@sha256:b6b35c3d567fef2a5ab21337e3cedee4e0eb019fb7ff60d9ef18756e5efbfaed_amd64",
          "8Base-RHOSE-Middleware:apicurio/apicurio-studio-ui-rhel8@sha256:eec7ae42c90e2ca103375d996656ebcf072e5e117bfc22f3ad83a640823c0266_amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-7195"
        },
        {
          "category": "external",
          "summary": "RHBZ#2376300",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2376300"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-7195",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-7195"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-7195",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7195"
        }
      ],
      "release_date": "2025-08-07T18:59:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-01-08T09:43:15+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "8Base-RHOSE-Middleware:apicurio/apicurio-registry-3-operator-bundle@sha256:f2465c11816ed5485383c0ad75f2db165def459c65989521d961c88109a3ec98_amd64",
            "8Base-RHOSE-Middleware:apicurio/apicurio-registry-rhel8-operator@sha256:33cc8950a0ff4c8067f2bb5b57e583c0eec1f531db391a2c4a95d3accab96e21_amd64",
            "8Base-RHOSE-Middleware:apicurio/apicurio-registry-rhel8@sha256:b6b710d7f748c3619360359cf02034200896c496d7560ef1871f25b43b2818a1_amd64",
            "8Base-RHOSE-Middleware:apicurio/apicurio-registry-ui-rhel8@sha256:b6b35c3d567fef2a5ab21337e3cedee4e0eb019fb7ff60d9ef18756e5efbfaed_amd64",
            "8Base-RHOSE-Middleware:apicurio/apicurio-studio-ui-rhel8@sha256:eec7ae42c90e2ca103375d996656ebcf072e5e117bfc22f3ad83a640823c0266_amd64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHBA-2024:11569"
        },
        {
          "category": "workaround",
          "details": "In Red Hat OpenShift Container Platform, the following default configurations reduce the impact of this vulnerability.\n\nSecurity Context Constraints (SCCs): The default SCC, Restricted-v2, applies several crucial security settings to containers. \n\nCapabilities: drop: ALL removes all Linux capabilities, including SETUID and SETGID. This prevents a process from changing its user or group ID, a common step in privilege escalation attacks. The SETUID and SETGID capabilities can also be dropped explicitly if other capabilities are still required.\n\nallowPrivilegeEscalation: false ensures that a process cannot gain more privileges than its parent process. This blocks attempts by a compromised container process to grant itself additional capabilities.\n\nSELinux Mandatory Access Control (MAC): Pods are required to run with a pre-allocated Multi-Category Security (MCS) label. This SELinux feature provides a strong layer of isolation between containers and from the host system. A properly configured SELinux policy can prevent a container escape, even if an attacker gains elevated permissions within the container itself.\n\nFilesystem Hardening: While not a default setting, a common security practice is to set readOnlyRootFilesystem: true in a container\u0027s security context. In this specific scenario, this configuration would prevent an attacker from modifying critical files like /etc/passwd, even if they managed to gain file-level write permissions.",
          "product_ids": [
            "8Base-RHOSE-Middleware:apicurio/apicurio-registry-3-operator-bundle@sha256:f2465c11816ed5485383c0ad75f2db165def459c65989521d961c88109a3ec98_amd64",
            "8Base-RHOSE-Middleware:apicurio/apicurio-registry-rhel8-operator@sha256:33cc8950a0ff4c8067f2bb5b57e583c0eec1f531db391a2c4a95d3accab96e21_amd64",
            "8Base-RHOSE-Middleware:apicurio/apicurio-registry-rhel8@sha256:b6b710d7f748c3619360359cf02034200896c496d7560ef1871f25b43b2818a1_amd64",
            "8Base-RHOSE-Middleware:apicurio/apicurio-registry-ui-rhel8@sha256:b6b35c3d567fef2a5ab21337e3cedee4e0eb019fb7ff60d9ef18756e5efbfaed_amd64",
            "8Base-RHOSE-Middleware:apicurio/apicurio-studio-ui-rhel8@sha256:eec7ae42c90e2ca103375d996656ebcf072e5e117bfc22f3ad83a640823c0266_amd64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "LOW",
            "baseScore": 5.2,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:H/A:L",
            "version": "3.1"
          },
          "products": [
            "8Base-RHOSE-Middleware:apicurio/apicurio-registry-3-operator-bundle@sha256:f2465c11816ed5485383c0ad75f2db165def459c65989521d961c88109a3ec98_amd64",
            "8Base-RHOSE-Middleware:apicurio/apicurio-registry-rhel8-operator@sha256:33cc8950a0ff4c8067f2bb5b57e583c0eec1f531db391a2c4a95d3accab96e21_amd64",
            "8Base-RHOSE-Middleware:apicurio/apicurio-registry-rhel8@sha256:b6b710d7f748c3619360359cf02034200896c496d7560ef1871f25b43b2818a1_amd64",
            "8Base-RHOSE-Middleware:apicurio/apicurio-registry-ui-rhel8@sha256:b6b35c3d567fef2a5ab21337e3cedee4e0eb019fb7ff60d9ef18756e5efbfaed_amd64",
            "8Base-RHOSE-Middleware:apicurio/apicurio-studio-ui-rhel8@sha256:eec7ae42c90e2ca103375d996656ebcf072e5e117bfc22f3ad83a640823c0266_amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "operator-sdk: privilege escalation due to incorrect permissions of /etc/passwd"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…