This site requires JavaScript to be enabled to function correctly, please enable it.
Summary:
CVE-2021-3917 coreos-installer: restrict access permissions on /boot/ignition{,/config.ign}
Product:
[Other] Security Response
Reporter:
Cedric Buissart <cbuissar>
Component:
vulnerability Assignee:
Red Hat Product Security <security-response-team>
Status:
CLOSED
ERRATA
QA Contact:
Severity:
medium
Docs Contact:
Priority:
medium
Version:
unspecified CC:
amurdaca, bgilbert, bgilbert, bmontgom, dornelas, dustymabe, eparis, jburrell, jligon, jokerman, jonathan, mrussell, nstielau, rhcos-triage, rust-sig, skunkerk, sponnaga, vkumar
Target Milestone:
--- Keywords:
Security
Target Release:
---
Hardware:
All
OS:
Linux
Whiteboard:
Fixed In Version:
coreos-installer 0.10.0
Doc Type:
If docs needed, set a value
Doc Text:
A flaw was found in the coreos-installer, where it writes the Ignition config to the target system with world-readable access permissions. This flaw allows a local attacker to have read access to potentially sensitive data. The highest threat from this vulnerability is to confidentiality.
Story Points:
---
Clone Of:
Environment:
Last Closed:
2021-11-30 09:52:02 UTC
Type:
---
Regression:
---
Mount Type:
---
Documentation:
---
CRM:
Verified Versions:
Category:
---
oVirt Team:
---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team:
---
Target Upstream Version:
Embargoed:
Bug Depends On:
1989544 , 2018889 , 2021210 , 2021285 , 2021286 , 2021287 , 2021288
Bug Blocks:
2018480
coreos-installer did not have sufficiently restrictive permissions on directories /boot/ignition{,/config.ign}. A local attacker could use this flaw to have read access to potentially sensitive data. Upstream fix : https://github.com/coreos/coreos-installer/commit/2a36405339c87b16ed6c76e91ad5b76638fbdb0c Fixed in version 0.10.0