6.2

CVE-2024-2905

A security vulnerability has been discovered within rpm-ostree, pertaining to the /etc/shadow file in default builds having the world-readable bit enabled. This issue arises from the default permissions being set at a higher level than recommended, potentially exposing sensitive authentication data to unauthorized access.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
Collection URLhttps://github.com/coreos/rpm-ostree
Package rpm-ostree
Default Statusunaffected
Version 1.2024.4
Status affected
VendorRed Hat
Product Red Hat Enterprise Linux 10
Default Statusaffected
Version < *
Version 0:2025.5-1.el10
Status unaffected
VendorRed Hat
Product Red Hat Enterprise Linux 9
Default Statusaffected
Version < *
Version 0:2024.3-3.el9_4
Status unaffected
VendorRed Hat
Product Red Hat Enterprise Linux 9.2 Extended Update Support
Default Statusaffected
Version < *
Version 0:2023.3-2.el9_2
Status unaffected
VendorRed Hat
Product Red Hat Enterprise Linux 8
Default Statusunaffected
VendorRed Hat
Product Red Hat OpenShift Container Platform 4
Default Statusunaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.02% 0.023
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
secalert@redhat.com 6.2 2.5 3.6
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CWE-732 Incorrect Permission Assignment for Critical Resource

The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.