A security vulnerability has been discovered within rpm-ostree, pertaining to the /etc/shadow file in default builds having the world-readable bit enabled. This issue arises from the default permissions being set at a higher level than recommended, potentially exposing sensitive authentication data to unauthorized access.
Workaround:
The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHBA-2025:4872 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:3401 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:3823 | vendor advisory |
https://access.redhat.com/security/cve/CVE-2024-2905 | vdb entry |
https://bugzilla.redhat.com/show_bug.cgi?id=2271585 | issue tracking |
https://github.com/coreos/rpm-ostree/security/advisories/GHSA-2m76-cwhg-7wv6 |