Описание
A security vulnerability has been discovered within rpm-ostree, pertaining to the /etc/shadow file in default builds having the world-readable bit enabled. This issue arises from the default permissions being set at a higher level than recommended, potentially exposing sensitive authentication data to unauthorized access.
Отчет
This vulnerability lets local, unconfined applications read the hashed password for all users of the system from those files. To gain further access to the system, those hashed passwords need to be brute-forced to discover the real passwords that may be used to authenticate as a more privileged user on the system, for example over SSH. On systems with SELinux enabled and in enforcing mode, access to those files is limited to unconfined (usually interactive) users, unconfined systemd services and privileged containers. Confined daemons, users and containers are not able to access them. Only OpenShift clusters installed on OCP version 4.14 and later are affected. OpenShift Clusters installed on previous OCP releases or updated to 4.14 and later are not affected, because /etc/shadow is usually “locally modified” and the local version remains. Clusters with no passwords set for any users (i.e. only SSH keys were used; the OpenShift default) are not impacted by this vulnerability even though it is present on the node.
Меры по смягчению последствий
If you need to apply the fix immediately, you can run the following commands, using credentials that have administrator access to an OpenShift cluster:
List current permissions for all nodes
for node in $( oc get nodes -oname) ; do echo $node ; oc debug $node -- bash -c "ls -alhZ /host/etc/shadow"; done
Set correct permissions
for node in $( oc get nodes -oname) ; do echo $node ; oc debug $node -- chmod --verbose 0000 /host/etc/shadow /host/etc/gshadow /host/etc/shadow- /host/etc/gshadow-; done As a precaution, we recommend rotating all user credentials stored in those files.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 8 | rpm-ostree | Not affected | ||
Red Hat OpenShift Container Platform 4 | rpm-ostree | Not affected | ||
Red Hat Enterprise Linux 10 | rpm-ostree | Fixed | RHBA-2025:4872 | 13.05.2025 |
Red Hat Enterprise Linux 9 | rpm-ostree | Fixed | RHSA-2024:3823 | 11.06.2024 |
Red Hat Enterprise Linux 9.2 Extended Update Support | rpm-ostree | Fixed | RHSA-2024:3401 | 28.05.2024 |
Показывать по
Дополнительная информация
Статус:
EPSS
6.2 Medium
CVSS3
Связанные уязвимости
A security vulnerability has been discovered within rpm-ostree, pertaining to the /etc/shadow file in default builds having the world-readable bit enabled. This issue arises from the default permissions being set at a higher level than recommended, potentially exposing sensitive authentication data to unauthorized access.
ELBA-2025-4872: rpm-ostree bug fix and enhancement update (MODERATE)
Уязвимость пакета rpm-ostree операционных систем Red Hat Enterprise Linux и Fedora, позволяющая нарушителю получить несанкционированный доступ к аутентификационным данным
EPSS
6.2 Medium
CVSS3