A flaw was found in the Mirror Registry. The quay-app container shipped as part of the Mirror Registry for OpenShift has write access to the `/etc/passwd`. This flaw allows a malicious actor with access to the container to modify the passwd file and elevate their privileges to the root user within that pod.
Metrics
Affected Vendors & Products
References
History
Fri, 09 May 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 09 May 2025 12:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | No description is available for this CVE. | A flaw was found in the Mirror Registry. The quay-app container shipped as part of the Mirror Registry for OpenShift has write access to the `/etc/passwd`. This flaw allows a malicious actor with access to the container to modify the passwd file and elevate their privileges to the root user within that pod. |
Title | mirror-registry: Local privilege escalation due to incorrect permissions in mirror-registry | Mirror-registry: local privilege escalation due to incorrect permissions in mirror-registry |
First Time appeared |
Redhat
Redhat mirror Registry |
|
CPEs | cpe:/a:redhat:mirror_registry:1 | |
Vendors & Products |
Redhat
Redhat mirror Registry |
|
References |
|
Sat, 12 Apr 2025 03:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | No description is available for this CVE. | |
Title | mirror-registry: Local privilege escalation due to incorrect permissions in mirror-registry | |
Weaknesses | CWE-276 | |
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-05-09T14:10:27.855Z
Reserved: 2025-04-11T18:46:42.874Z
Link: CVE-2025-3528

Updated: 2025-05-09T14:10:19.394Z

Status : Awaiting Analysis
Published: 2025-05-09T12:15:33.223
Modified: 2025-05-12T17:32:32.760
Link: CVE-2025-3528
