SB2025121639 - Multiple vulnerabilities in Red Hat Advanced Cluster Security (RHACS) 4.7
Published: December 16, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Incorrect default permissions (CVE-ID: CVE-2024-25621)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to incorrect default permissions set for critical files, such as /var/lib/containerd (0711 instead of 0700), /run/containerd/io.containerd.grpc.v1.cri (0755 instead of 0700), and /run/containerd/io.containerd.sandbox.controller.v1.shim (0711 instead of 0700) and for the temp directory. A local user can escalate privileges on the system.
2) Race condition (CVE-ID: CVE-2025-47907)
The vulnerability allows an attacker to tamper with the application.
The vulnerability exists due to a race condition when canceling a DB query. A local user can exploit the race and gain unauthorized access to sensitive information and escalate privileges on the system. A remote user can overwrite the expected results with those of another query, causing the call to Scan to return either unexpected results from the other query or an error.
3) Resource exhaustion (CVE-ID: CVE-2025-59375)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to application does not properly control consumption of internal resources. A remote attacker can trigger large dynamic memory allocations via a small document and perform a denial of service (DoS) attack.
4) Buffer overflow (CVE-ID: CVE-2025-6965)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error when processing aggregated terms. A remote attacker can pass specially crafted input to the application where the number of aggregate terms exceeds the number of columns available, trigger memory corruption and perform a denial of service (DoS) attack.
5) Resource exhaustion (CVE-ID: CVE-2025-9648)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to application does not properly control consumption of internal resources when handling HTTP POST requests with a null byte in the payload within the mg_handle_form_request() function. A remote attacker can send a specially crafted HTTP request to the application and consume all available CPU resources, leading to a denial of service.
Remediation
Install update from vendor's website.