RHSA-2025:23542

Vulnerability from csaf_redhat - Published: 2025-12-17 16:35 - Updated: 2025-12-29 17:13
Summary
Red Hat Security Advisory: OpenShift File Integrity Operator bug fix and enhancement update

Notes

Topic
An updated OpenShift File Integrity Operator image that fixes various bugs and adds new enhancements is now available for the Red Hat OpenShift Enterprise 4 catalog.
Details
The OpenShift File Integrity Operator v1.3.8 is now available. See the documentation for bug fix information: https://docs.openshift.com/container-platform/latest/security/file_integrity_operator/file-integrity-operator-release-notes.html
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Low"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An updated OpenShift File Integrity Operator image that fixes various bugs and adds new\nenhancements is now available for the Red Hat OpenShift Enterprise 4 catalog.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The OpenShift File Integrity Operator v1.3.8 is now available.\nSee the documentation for bug fix information:\n\nhttps://docs.openshift.com/container-platform/latest/security/file_integrity_operator/file-integrity-operator-release-notes.html",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2025:23542",
        "url": "https://access.redhat.com/errata/RHSA-2025:23542"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/cve/CVE-2025-7195",
        "url": "https://access.redhat.com/security/cve/CVE-2025-7195"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/",
        "url": "https://access.redhat.com/security/updates/classification/"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_23542.json"
      }
    ],
    "title": "Red Hat Security Advisory: OpenShift File Integrity Operator bug fix and enhancement update",
    "tracking": {
      "current_release_date": "2025-12-29T17:13:09+00:00",
      "generator": {
        "date": "2025-12-29T17:13:09+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.14"
        }
      },
      "id": "RHSA-2025:23542",
      "initial_release_date": "2025-12-17T16:35:07+00:00",
      "revision_history": [
        {
          "date": "2025-12-17T16:35:07+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2025-12-17T16:35:11+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-12-29T17:13:09+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "File Integrity Operator 1",
                "product": {
                  "name": "File Integrity Operator 1",
                  "product_id": "File Integrity Operator 1",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift_file_integrity_operator:1::el9"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "File Integrity Operator"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "registry.redhat.io/compliance/openshift-file-integrity-operator-bundle@sha256:efb25a29f837eebee8a0b566eb2c8cf8cebce7cb16198e90d87231fe3cc35316_amd64",
                "product": {
                  "name": "registry.redhat.io/compliance/openshift-file-integrity-operator-bundle@sha256:efb25a29f837eebee8a0b566eb2c8cf8cebce7cb16198e90d87231fe3cc35316_amd64",
                  "product_id": "registry.redhat.io/compliance/openshift-file-integrity-operator-bundle@sha256:efb25a29f837eebee8a0b566eb2c8cf8cebce7cb16198e90d87231fe3cc35316_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/openshift-file-integrity-operator-bundle@sha256%3Aefb25a29f837eebee8a0b566eb2c8cf8cebce7cb16198e90d87231fe3cc35316?arch=amd64\u0026repository_url=registry.redhat.io/compliance"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "registry.redhat.io/compliance/openshift-file-integrity-rhel8-operator@sha256:1d10b1fd2f76dd5e8c97c38747e621c39aca11b7b64cb820c1264680b7686138_amd64",
                "product": {
                  "name": "registry.redhat.io/compliance/openshift-file-integrity-rhel8-operator@sha256:1d10b1fd2f76dd5e8c97c38747e621c39aca11b7b64cb820c1264680b7686138_amd64",
                  "product_id": "registry.redhat.io/compliance/openshift-file-integrity-rhel8-operator@sha256:1d10b1fd2f76dd5e8c97c38747e621c39aca11b7b64cb820c1264680b7686138_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/openshift-file-integrity-rhel8-operator@sha256%3A1d10b1fd2f76dd5e8c97c38747e621c39aca11b7b64cb820c1264680b7686138?arch=amd64\u0026repository_url=registry.redhat.io/compliance"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "amd64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "registry.redhat.io/compliance/openshift-file-integrity-rhel8-operator@sha256:822fc16687164f666df5e498030bec3d3ab1e07d0a0576cc133a468e4ea01cf2_ppc64le",
                "product": {
                  "name": "registry.redhat.io/compliance/openshift-file-integrity-rhel8-operator@sha256:822fc16687164f666df5e498030bec3d3ab1e07d0a0576cc133a468e4ea01cf2_ppc64le",
                  "product_id": "registry.redhat.io/compliance/openshift-file-integrity-rhel8-operator@sha256:822fc16687164f666df5e498030bec3d3ab1e07d0a0576cc133a468e4ea01cf2_ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:oci/openshift-file-integrity-rhel8-operator@sha256%3A822fc16687164f666df5e498030bec3d3ab1e07d0a0576cc133a468e4ea01cf2?arch=ppc64le\u0026repository_url=registry.redhat.io/compliance"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "registry.redhat.io/compliance/openshift-file-integrity-rhel8-operator@sha256:ef2ee875f55a754e5d3f3d75654f429d33357f0e83f955575ebe67f0634bb715_s390x",
                "product": {
                  "name": "registry.redhat.io/compliance/openshift-file-integrity-rhel8-operator@sha256:ef2ee875f55a754e5d3f3d75654f429d33357f0e83f955575ebe67f0634bb715_s390x",
                  "product_id": "registry.redhat.io/compliance/openshift-file-integrity-rhel8-operator@sha256:ef2ee875f55a754e5d3f3d75654f429d33357f0e83f955575ebe67f0634bb715_s390x",
                  "product_identification_helper": {
                    "purl": "pkg:oci/openshift-file-integrity-rhel8-operator@sha256%3Aef2ee875f55a754e5d3f3d75654f429d33357f0e83f955575ebe67f0634bb715?arch=s390x\u0026repository_url=registry.redhat.io/compliance"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/compliance/openshift-file-integrity-operator-bundle@sha256:efb25a29f837eebee8a0b566eb2c8cf8cebce7cb16198e90d87231fe3cc35316_amd64 as a component of File Integrity Operator 1",
          "product_id": "File Integrity Operator 1:registry.redhat.io/compliance/openshift-file-integrity-operator-bundle@sha256:efb25a29f837eebee8a0b566eb2c8cf8cebce7cb16198e90d87231fe3cc35316_amd64"
        },
        "product_reference": "registry.redhat.io/compliance/openshift-file-integrity-operator-bundle@sha256:efb25a29f837eebee8a0b566eb2c8cf8cebce7cb16198e90d87231fe3cc35316_amd64",
        "relates_to_product_reference": "File Integrity Operator 1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/compliance/openshift-file-integrity-rhel8-operator@sha256:1d10b1fd2f76dd5e8c97c38747e621c39aca11b7b64cb820c1264680b7686138_amd64 as a component of File Integrity Operator 1",
          "product_id": "File Integrity Operator 1:registry.redhat.io/compliance/openshift-file-integrity-rhel8-operator@sha256:1d10b1fd2f76dd5e8c97c38747e621c39aca11b7b64cb820c1264680b7686138_amd64"
        },
        "product_reference": "registry.redhat.io/compliance/openshift-file-integrity-rhel8-operator@sha256:1d10b1fd2f76dd5e8c97c38747e621c39aca11b7b64cb820c1264680b7686138_amd64",
        "relates_to_product_reference": "File Integrity Operator 1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/compliance/openshift-file-integrity-rhel8-operator@sha256:822fc16687164f666df5e498030bec3d3ab1e07d0a0576cc133a468e4ea01cf2_ppc64le as a component of File Integrity Operator 1",
          "product_id": "File Integrity Operator 1:registry.redhat.io/compliance/openshift-file-integrity-rhel8-operator@sha256:822fc16687164f666df5e498030bec3d3ab1e07d0a0576cc133a468e4ea01cf2_ppc64le"
        },
        "product_reference": "registry.redhat.io/compliance/openshift-file-integrity-rhel8-operator@sha256:822fc16687164f666df5e498030bec3d3ab1e07d0a0576cc133a468e4ea01cf2_ppc64le",
        "relates_to_product_reference": "File Integrity Operator 1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/compliance/openshift-file-integrity-rhel8-operator@sha256:ef2ee875f55a754e5d3f3d75654f429d33357f0e83f955575ebe67f0634bb715_s390x as a component of File Integrity Operator 1",
          "product_id": "File Integrity Operator 1:registry.redhat.io/compliance/openshift-file-integrity-rhel8-operator@sha256:ef2ee875f55a754e5d3f3d75654f429d33357f0e83f955575ebe67f0634bb715_s390x"
        },
        "product_reference": "registry.redhat.io/compliance/openshift-file-integrity-rhel8-operator@sha256:ef2ee875f55a754e5d3f3d75654f429d33357f0e83f955575ebe67f0634bb715_s390x",
        "relates_to_product_reference": "File Integrity Operator 1"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Antony Di Scala",
            "Michael Whale",
            "James Force"
          ]
        }
      ],
      "cve": "CVE-2025-7195",
      "cwe": {
        "id": "CWE-276",
        "name": "Incorrect Default Permissions"
      },
      "discovery_date": "2025-07-04T08:54:01.878000+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "File Integrity Operator 1:registry.redhat.io/compliance/openshift-file-integrity-operator-bundle@sha256:efb25a29f837eebee8a0b566eb2c8cf8cebce7cb16198e90d87231fe3cc35316_amd64"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2376300"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Early versions of Operator-SDK provided an insecure method to allow operator containers to run in environments that used a random UID. Operator-SDK before 0.15.2 provided a script, user_setup, which modifies the permissions of the /etc/passwd file to 664 during build time. Developers who used Operator-SDK before 0.15.2 to scaffold their operator may still be impacted by this if the insecure user_setup script is still being used to build new container images. \n\nIn affected images, the /etc/passwd file is created during build time with group-writable permissions and a group ownership of root (gid=0). An attacker who can execute commands within an affected container, even as a non-root user, may be able to leverage their membership in the root group to modify the /etc/passwd file. This could allow the attacker to add a new user with any arbitrary UID, including UID 0, leading to full root privileges within the container.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "operator-sdk: privilege escalation due to incorrect permissions of /etc/passwd",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security has rated this vulnerability as low severity for affected products which run on OpenShift. The vulnerability allows for potential privilege escalation within a container, but OpenShift\u0027s default, multi-layered security posture effectively mitigates this risk. \n\nThe primary controls include the default Security Context Constraints (SCC), which severely limit a container\u0027s permissions from the start, and SELinux, which enforces mandatory access control to ensure strict isolation. While other container runtime environments may have different controls available and require case-by-case analysis, OpenShift\u0027s built-in defenses are designed to prevent this type of attack.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "File Integrity Operator 1:registry.redhat.io/compliance/openshift-file-integrity-rhel8-operator@sha256:1d10b1fd2f76dd5e8c97c38747e621c39aca11b7b64cb820c1264680b7686138_amd64",
          "File Integrity Operator 1:registry.redhat.io/compliance/openshift-file-integrity-rhel8-operator@sha256:822fc16687164f666df5e498030bec3d3ab1e07d0a0576cc133a468e4ea01cf2_ppc64le",
          "File Integrity Operator 1:registry.redhat.io/compliance/openshift-file-integrity-rhel8-operator@sha256:ef2ee875f55a754e5d3f3d75654f429d33357f0e83f955575ebe67f0634bb715_s390x"
        ],
        "known_not_affected": [
          "File Integrity Operator 1:registry.redhat.io/compliance/openshift-file-integrity-operator-bundle@sha256:efb25a29f837eebee8a0b566eb2c8cf8cebce7cb16198e90d87231fe3cc35316_amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-7195"
        },
        {
          "category": "external",
          "summary": "RHBZ#2376300",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2376300"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-7195",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-7195"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-7195",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7195"
        }
      ],
      "release_date": "2025-08-07T18:59:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-17T16:35:07+00:00",
          "details": "Before applying this update, make sure all previously released errata relevant to your\nsystem have been applied. For details on how to apply this update, refer to:\n  \nhttps://docs.openshift.com/container-platform/latest/updating/updating_a_cluster/updating-cluster-cli.html",
          "product_ids": [
            "File Integrity Operator 1:registry.redhat.io/compliance/openshift-file-integrity-rhel8-operator@sha256:1d10b1fd2f76dd5e8c97c38747e621c39aca11b7b64cb820c1264680b7686138_amd64",
            "File Integrity Operator 1:registry.redhat.io/compliance/openshift-file-integrity-rhel8-operator@sha256:822fc16687164f666df5e498030bec3d3ab1e07d0a0576cc133a468e4ea01cf2_ppc64le",
            "File Integrity Operator 1:registry.redhat.io/compliance/openshift-file-integrity-rhel8-operator@sha256:ef2ee875f55a754e5d3f3d75654f429d33357f0e83f955575ebe67f0634bb715_s390x"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:23542"
        },
        {
          "category": "workaround",
          "details": "In Red Hat OpenShift Container Platform, the following default configurations reduce the impact of this vulnerability.\n\nSecurity Context Constraints (SCCs): The default SCC, Restricted-v2, applies several crucial security settings to containers. \n\nCapabilities: drop: ALL removes all Linux capabilities, including SETUID and SETGID. This prevents a process from changing its user or group ID, a common step in privilege escalation attacks. The SETUID and SETGID capabilities can also be dropped explicitly if other capabilities are still required.\n\nallowPrivilegeEscalation: false ensures that a process cannot gain more privileges than its parent process. This blocks attempts by a compromised container process to grant itself additional capabilities.\n\nSELinux Mandatory Access Control (MAC): Pods are required to run with a pre-allocated Multi-Category Security (MCS) label. This SELinux feature provides a strong layer of isolation between containers and from the host system. A properly configured SELinux policy can prevent a container escape, even if an attacker gains elevated permissions within the container itself.\n\nFilesystem Hardening: While not a default setting, a common security practice is to set readOnlyRootFilesystem: true in a container\u0027s security context. In this specific scenario, this configuration would prevent an attacker from modifying critical files like /etc/passwd, even if they managed to gain file-level write permissions.",
          "product_ids": [
            "File Integrity Operator 1:registry.redhat.io/compliance/openshift-file-integrity-operator-bundle@sha256:efb25a29f837eebee8a0b566eb2c8cf8cebce7cb16198e90d87231fe3cc35316_amd64",
            "File Integrity Operator 1:registry.redhat.io/compliance/openshift-file-integrity-rhel8-operator@sha256:1d10b1fd2f76dd5e8c97c38747e621c39aca11b7b64cb820c1264680b7686138_amd64",
            "File Integrity Operator 1:registry.redhat.io/compliance/openshift-file-integrity-rhel8-operator@sha256:822fc16687164f666df5e498030bec3d3ab1e07d0a0576cc133a468e4ea01cf2_ppc64le",
            "File Integrity Operator 1:registry.redhat.io/compliance/openshift-file-integrity-rhel8-operator@sha256:ef2ee875f55a754e5d3f3d75654f429d33357f0e83f955575ebe67f0634bb715_s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "LOW",
            "baseScore": 5.2,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:H/A:L",
            "version": "3.1"
          },
          "products": [
            "File Integrity Operator 1:registry.redhat.io/compliance/openshift-file-integrity-operator-bundle@sha256:efb25a29f837eebee8a0b566eb2c8cf8cebce7cb16198e90d87231fe3cc35316_amd64",
            "File Integrity Operator 1:registry.redhat.io/compliance/openshift-file-integrity-rhel8-operator@sha256:1d10b1fd2f76dd5e8c97c38747e621c39aca11b7b64cb820c1264680b7686138_amd64",
            "File Integrity Operator 1:registry.redhat.io/compliance/openshift-file-integrity-rhel8-operator@sha256:822fc16687164f666df5e498030bec3d3ab1e07d0a0576cc133a468e4ea01cf2_ppc64le",
            "File Integrity Operator 1:registry.redhat.io/compliance/openshift-file-integrity-rhel8-operator@sha256:ef2ee875f55a754e5d3f3d75654f429d33357f0e83f955575ebe67f0634bb715_s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "operator-sdk: privilege escalation due to incorrect permissions of /etc/passwd"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…