SB2025120556 - Multiple vulnerabilities in Red Hat OpenShift Container Platform 4.13
Published: December 5, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Creation of Temporary File With Insecure Permissions (CVE-ID: CVE-2025-4953)
The vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to data written to RUN --mount=type=bind mounts during the podman build is not discarded. A local user can gain access to temporary files.
2) Out-of-bounds read (CVE-ID: CVE-2025-5318)
The vulnerability allows a remote user to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition within the sftp_handle() function. A remote user can trigger an out-of-bounds read error and read contents of memory on the system.
3) UNIX symbolic link following (CVE-ID: CVE-2025-31133)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a symlink following issue within the maskedPaths feature. A local user can create a specially crafted symbolic link to a critical file on the system and overwrite it with privileges of the application.
Successful exploitation of this vulnerability may result in privilege escalation.
4) UNIX symbolic link following (CVE-ID: CVE-2025-52565)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a symlink following issue related to /dev/console mounts. A local user can escape the container using a malicious config and escalate privileges on the system.
5) UNIX symbolic link following (CVE-ID: CVE-2025-52881)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a symlink following issue related to procfs write redirects. A local user can create a specially crafted symbolic link to a critical file on the system and overwrite it with privileges of the application.
Successful exploitation of this vulnerability may result in privilege escalation.
Remediation
Install update from vendor's website.