6.2
CVE-2024-2905
- EPSS 0.02%
- Published 25.04.2024 18:15:08
- Last modified 29.05.2025 18:15:23
- Source secalert@redhat.com
- Teams watchlist Login
- Open Login
A security vulnerability has been discovered within rpm-ostree, pertaining to the /etc/shadow file in default builds having the world-readable bit enabled. This issue arises from the default permissions being set at a higher level than recommended, potentially exposing sensitive authentication data to unauthorized access.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
Collection URLhttps://github.com/coreos/rpm-ostree
≫
Package
rpm-ostree
Default Statusunaffected
Version
1.2024.4
Status
affected
VendorRed Hat
≫
Product
Red Hat Enterprise Linux 10
Default Statusaffected
Version <
*
Version
0:2025.5-1.el10
Status
unaffected
VendorRed Hat
≫
Product
Red Hat Enterprise Linux 9
Default Statusaffected
Version <
*
Version
0:2024.3-3.el9_4
Status
unaffected
VendorRed Hat
≫
Product
Red Hat Enterprise Linux 9.2 Extended Update Support
Default Statusaffected
Version <
*
Version
0:2023.3-2.el9_2
Status
unaffected
VendorRed Hat
≫
Product
Red Hat Enterprise Linux 8
Default Statusunaffected
VendorRed Hat
≫
Product
Red Hat OpenShift Container Platform 4
Default Statusunaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.02% | 0.023 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
secalert@redhat.com | 6.2 | 2.5 | 3.6 |
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
CWE-732 Incorrect Permission Assignment for Critical Resource
The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.