Lucene search

K
redhatcveRedhat.comRH:CVE-2024-2905
HistoryApr 09, 2024 - 11:51 a.m.

CVE-2024-2905

2024-04-0911:51:02
redhat.com
access.redhat.com
7
rpm-ostree
vulnerability
/etc/shadow
permissions
authentication data
openshift cluster
fix
user credentials.

6.2 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

7.1 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

15.5%

A security vulnerability has been discovered within rpm-ostree, pertaining to the /etc/shadow file in default builds having the world-readable bit enabled. This issue arises from the default permissions being set at a higher level than recommended, potentially exposing sensitive authentication data to unauthorized access.

Mitigation

If you need to apply the fix immediately, you can run the following commands, using credentials that have administrator access to an OpenShift cluster:

List current permissions for all nodes

for node in $( oc get nodes -oname) ; do echo $node ; oc debug $node – bash -c "ls -alhZ /host/etc/shadow"; done

Set correct permissions

for node in $( oc get nodes -oname) ; do echo $node ; oc debug $node – chmod --verbose 0000 /host/etc/shadow /host/etc/gshadow /host/etc/shadow- /host/etc/gshadow-; done

As a precaution, we recommend rotating all user credentials stored in those files.

6.2 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

7.1 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

15.5%