Vulnerability Description
A security vulnerability has been discovered within rpm-ostree, pertaining to the /etc/shadow file in default builds having the world-readable bit enabled. This issue arises from the default permissions being set at a higher level than recommended, potentially exposing sensitive authentication data to unauthorized access.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- https://access.redhat.com/errata/RHBA-2025:4872
- https://access.redhat.com/errata/RHSA-2024:3401
- https://access.redhat.com/errata/RHSA-2024:3823
- https://access.redhat.com/security/cve/CVE-2024-2905
- https://bugzilla.redhat.com/show_bug.cgi?id=2271585
- https://github.com/coreos/rpm-ostree/security/advisories/GHSA-2m76-cwhg-7wv6
- https://access.redhat.com/errata/RHSA-2024:3401
- https://access.redhat.com/errata/RHSA-2024:3823
- https://access.redhat.com/security/cve/CVE-2024-2905
- https://bugzilla.redhat.com/show_bug.cgi?id=2271585
- https://github.com/coreos/rpm-ostree/security/advisories/GHSA-2m76-cwhg-7wv6
- https://lists.fedoraproject.org/archives/list/[email protected]
- https://lists.fedoraproject.org/archives/list/[email protected]
FAQ
What is CVE-2024-2905?
CVE-2024-2905 is a vulnerability with a CVSS score of 6.2 (MEDIUM). A security vulnerability has been discovered within rpm-ostree, pertaining to the /etc/shadow file in default builds having the world-readable bit enabled. This issue arises from the default permissio...
How severe is CVE-2024-2905?
CVE-2024-2905 has been rated MEDIUM with a CVSS base score of 6.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-2905?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.