SB2026010583 - Multiple vulnerabilities in Red Hat OpenShift Builds 1.6



SB2026010583 - Multiple vulnerabilities in Red Hat OpenShift Builds 1.6

Published: January 5, 2026

Security Bulletin ID SB2026010583
Severity
Medium
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Medium 50% Low 50%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) UNIX symbolic link following (CVE-ID: CVE-2025-52881)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a symlink following issue related to procfs write redirects. A local user can create a specially crafted symbolic link to a critical file on the system and overwrite it with privileges of the application.

Successful exploitation of this vulnerability may result in privilege escalation.


2) Allocation of Resources Without Limits or Throttling (CVE-ID: CVE-2025-66418)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to missing limits on the number of links in the decompression chain when handling gzip or zstd data in the server response. A malicious server can send a response with a large amount of links and cause high CPU load, leading to a denial of service condition. 


Remediation

Install update from vendor's website.