It has been found that multiple containers modify the permissions of /etc/passwd to make them modifiable by users other than root. An attacker with access to the running container can exploit this to modify /etc/passwd to add a user and escalate their privileges. This CVE is specific to the nmstate/kubernetes-nmstate-handler container. Original bug: https://bugzilla.redhat.com/show_bug.cgi?id=1791534
Acknowledgments: Name: Joseph LaMagna-Reiter (SPR Inc.)
Statement: By default this vulnerability is not exploitable in un-privilieged containers running on OpenShift Container Platform. This is because the system call SETUID and SETGID is blocked by the default seccomp policy.
Used fixcvenames on https://errata.devel.redhat.com/advisory/48747 and fixed the affects Closing the old flaw bug