Vulnerability Description
A container privilege escalation flaw was found in certain Fuse images. This issue stems from the /etc/passwd file being created with group-writable permissions during build time. In certain conditions, an attacker who can execute commands within an affected container, even as a non-root user, can leverage their membership in the root group to modify the /etc/passwd file. This could allow the attacker to add a new user with any arbitrary UID, including UID 0, leading to full root privileges within the container.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- https://access.redhat.com/security/cve/CVE-2025-57849
- https://bugzilla.redhat.com/show_bug.cgi?id=2391100
FAQ
What is CVE-2025-57849?
CVE-2025-57849 is a vulnerability with a CVSS score of 6.4 (MEDIUM). A container privilege escalation flaw was found in certain Fuse images. This issue stems from the /etc/passwd file being created with group-writable permissions during build time. In certain condition...
How severe is CVE-2025-57849?
CVE-2025-57849 has been rated MEDIUM with a CVSS base score of 6.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-57849?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.