SB2025120318 - Multiple vulnerabilities in Red Hat OpenShift Container Platform 4.17



SB2025120318 - Multiple vulnerabilities in Red Hat OpenShift Container Platform 4.17

Published: December 3, 2025

Security Bulletin ID SB2025120318
Severity
Medium
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Medium 50% Low 50%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Improper privilege management (CVE-ID: CVE-2025-11561)

The vulnerability allows a remote user to bypass authorization checks.

The vulnerability exists due to improper privilege management within the Active Directory integration feature. In default configurations, the Kerberos local authentication plugin (sssd_krb5_localauth_plugin) is enabled, but a fallback to the an2ln plugin is possible. This fallback allows an attacker with permission to modify certain AD attributes (such as userPrincipalName or samAccountName) to impersonate privileged users, potentially resulting in unauthorized access or privilege escalation on domain-joined Linux hosts.


2) Creation of Temporary File With Insecure Permissions (CVE-ID: CVE-2025-4953)

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to data written to RUN --mount=type=bind mounts during the podman build is not discarded. A local user can gain access to temporary files.


Remediation

Install update from vendor's website.