A vulnerability in the OpenShift Container Platform allows an attacker with developer access to modify the config.json file on a worker node. By exploiting the build process and using a misconfigured pod that mounts /var/lib/kubelet/config.json without read-only restrictions, the attacker can overwrite the credentials file required for pulling container images. This leads to a denial of service, preventing the node from fetching images and potentially leaking sensitive credentials used to access private image repositories.
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.18 Via RHSA-2025:9269 https://access.redhat.com/errata/RHSA-2025:9269
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.16 Via RHSA-2025:9765 https://access.redhat.com/errata/RHSA-2025:9765
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.14 Via RHSA-2025:9759 https://access.redhat.com/errata/RHSA-2025:9759
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.17 Via RHSA-2025:10294 https://access.redhat.com/errata/RHSA-2025:10294
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.12 Via RHSA-2025:10270 https://access.redhat.com/errata/RHSA-2025:10270
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.13 Via RHSA-2025:10747 https://access.redhat.com/errata/RHSA-2025:10747