Incorrect Default Permissions Affecting openshift4/cnf-tests-rhel8 package, versions *


Severity

Recommended
low

Based on Red Hat Enterprise Linux security rating.

Threat Intelligence

EPSS
0.01% (1st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Incorrect Default Permissions vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-RHEL8-OPENSHIFT4CNFTESTSRHEL8-11520822
  • published8 Aug 2025
  • disclosed7 Aug 2025

Introduced: 7 Aug 2025

NewCVE-2025-7195  (opens in a new tab)
CWE-276  (opens in a new tab)

How to fix?

There is no fixed version for RHEL:8 openshift4/cnf-tests-rhel8.

NVD Description

Note: Versions mentioned in the description apply only to the upstream openshift4/cnf-tests-rhel8 package and not the openshift4/cnf-tests-rhel8 package as distributed by RHEL. See How to fix? for RHEL:8 relevant fixed versions and status.

Early versions of Operator-SDK provided an insecure method to allow operator containers to run in environments that used a random UID. Operator-SDK before 0.15.2 provided a script, user_setup, which modifies the permissions of the /etc/passwd file to 664 during build time. Developers who used Operator-SDK before 0.15.2 to scaffold their operator may still be impacted by this if the insecure user_setup script is still being used to build new container images.

In affected images, the /etc/passwd file is created during build time with group-writable permissions and a group ownership of root (gid=0). An attacker who can execute commands within an affected container, even as a non-root user, may be able to leverage their membership in the root group to modify the /etc/passwd file. This could allow the attacker to add a new user with any arbitrary UID, including UID 0, leading to full root privileges within the container.

CVSS Base Scores

version 3.1