A security vulnerability has been discovered within rpm-ostree, pertaining to the /etc/shadow file in default builds having the world-readable bit enabled. This issue arises from the default permissions being set at a higher level than recommended, potentially exposing sensitive authentication data to unauthorized access.
If you need to apply the fix immediately, you can run the following commands, using credentials that have administrator access to an OpenShift cluster:
for node in $( oc get nodes -oname) ; do echo $node ; oc debug $node – bash -c "ls -alhZ /host/etc/shadow"; done
for node in $( oc get nodes -oname) ; do echo $node ; oc debug $node – chmod --verbose 0000 /host/etc/shadow /host/etc/gshadow /host/etc/shadow- /host/etc/gshadow-; done
As a precaution, we recommend rotating all user credentials stored in those files.