Bug 2394418 (CVE-2025-58712) - CVE-2025-58712 amq: privilege escalation via excessive /etc/passwd permissions
Summary: CVE-2025-58712 amq: privilege escalation via excessive /etc/passwd permissions
Keywords:
Status: NEW
Alias: CVE-2025-58712
Deadline: 2025-10-07
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-09-10 17:32 UTC by OSIDB Bzimport
Modified: 2025-10-22 18:14 UTC (History)
5 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2025:17562 0 None None None 2025-10-08 14:39:28 UTC

Description OSIDB Bzimport 2025-09-10 17:32:33 UTC
The /etc/passwd file is created during build time with group-writable permissions. In certain conditions, an attacker who can execute commands within an affected container, even as a non-root user, may be able to leverage their membership in the root group to modify the /etc/passwd file. This could allow the attacker to add a new user with any arbitrary UID, including UID 0, leading to full root privileges within the container.

Comment 3 errata-xmlrpc 2025-10-08 14:39:27 UTC
This issue has been addressed in the following products:

  RHEL-9 based Middleware Containers

Via RHSA-2025:17562 https://access.redhat.com/errata/RHSA-2025:17562


Note You need to log in before you can comment on or make changes to this bug.