A flaw was found in the Mirror Registry. The quay-app container shipped as part of the Mirror Registry for OpenShift has write access to the `/etc/passwd`. This flaw allows a malicious actor with access to the container to modify the passwd file and elevate their privileges to the root user within that pod.
Workaround:
During installation, installed file permissions are set to allow anyone to modify those files.
Link | Tags |
---|---|
https://access.redhat.com/security/cve/CVE-2025-3528 | vdb entry |
https://bugzilla.redhat.com/show_bug.cgi?id=2359143 | issue tracking |